0% found this document useful (0 votes)
1 views

#4 Network Security

The document outlines various network security threats, including malware, phishing, and DDoS attacks, as well as the risks associated with network intrusions from both external and internal sources. It discusses methods of attack such as viruses, worms, Trojan horses, and denial of service attacks, along with the implications of spyware and spam. Additionally, it emphasizes the importance of a security policy and the tools necessary for protecting network assets.

Uploaded by

merir143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

#4 Network Security

The document outlines various network security threats, including malware, phishing, and DDoS attacks, as well as the risks associated with network intrusions from both external and internal sources. It discusses methods of attack such as viruses, worms, Trojan horses, and denial of service attacks, along with the implications of spyware and spam. Additionally, it emphasizes the importance of a security policy and the tools necessary for protecting network assets.

Uploaded by

merir143
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Department of

Information
communication
Technology
Advanced
Networking
Introduction to
Network Security

Kalayu N.
2015 E.C
I. Networking Threats
 Common network security threats include malicious software (malware),
phishing schemes, Distributed Denial of Service (DDoS). Many network
security issues create the additional risk of regulatory non-compliance.

Risks of Network Intrusion


 Intruders can gain access to a network through software
vulnerabilities, hardware attacks or even through less high-tech
methods, such as guessing someone's username and password.
 Intruders who gain access by modifying software or exploiting software
vulnerabilities are often called hackers.
Once the hacker gains access to the network, four
types of threat may arise:
 Information theft
 Identity theft
 Data loss / manipulation
 Disruption of service
Source of Network Intrusion

External Threats
 External threats arise from individuals working outside of an
organization. They do not have authorized access to the computer
systems or network. External attackers work their way into a
network mainly from the Internet, wireless links or dialup access
servers.
Internal Threats
 Internal threats occur when someone has authorized access to the
network through a user account or have physical access to the
network equipment. The internal attacker knows the internal politics
and people. They often know what information is both valuable and
vulnerable and how to get to it.
Social Engineering and Phishing
 Social engineering is a term refers to all techniques aimed at talking a target into
revealing specific information or performing a specific action for illegitimate reasons.
 Three of the most commonly used techniques in social engineering are:
pretexting, phishing, and vishing.

Pretexting
 Pretexting is a form of social engineering where an invented scenario (the pretext) is
used on a victim in order to get the victim to release information or perform an
action. The target is typically contacted over the telephone.
Phishing
 Phishing is a form of social engineering where the phisher pretends to represent a
legitimate outside organization. They typically contact the target individual (the
phishee) via email.
Vishing / Phone Phishing
 A new form of social engineering that uses Voice over IP (VoIP) is known as vishing.
With vishing, an unsuspecting user is sent a voice mail instructing them to call a
number which appears to be a legitimate telephone-banking service.
Method of attack
A. Viruses, Worms and Trojan horses
1. Virus
A computer virus is a type of malicious software, or malware, that spreads between computers
and causes damage to data and software. Computer viruses aim to disrupt systems, cause major
operational issues, and result in data loss and leakage.
1) File infector viruses: File infector viruses infect program files. These viruses normally infect
executable code, such as .com and .exe files. They can infect other files when an infected
program is run from floppy, hard drive, or from the network. Many of these viruses are memory
resident. After memory becomes infected, any non-infected executable that runs becomes
infected
2) Boot sector viruses: Boot sector viruses infect the system area of a disk; that is, the boot
record on floppy disks and hard disks.
3) Master boot record viruses: Master boot record viruses are memory-resident viruses that
infect disks in the same manner as boot sector viruses. The difference between these two virus
types is where the viral code is located. Master boot record infectors normally save a legitimate
copy of the master boot record in a different location.
4) Multipartite viruses: Multipartite (also known as polypartite) viruses infect both boot
records and program files. These are particularly difficult to repair. If the boot area is cleaned,
but the files are not, the boot area will be re-infected.
Cont.….
2. Worms
 A worm is similar to a virus by design and is considered to be a sub-class
of a virus.
 A computer worm is a type of malware whose primary function is to self-
replicate and infect other computers while remaining active on infected
systems.
 A worm uses the network to send copies of itself to any connected hosts.

3. Trojan Horses
 A Trojan horse is a non-self replicating program that is written to appear
like a legitimate program, when in fact it is an attack tool.
B. Denial of Service and Brute force Attack

Denial of Service (DoS)


 DoS attacks are aggressive attacks on an individual computer or groups
of computers with the intent to deny services to intended users. DoS
attacks can target end user systems, servers, routers, and network links.
Distributed Denial of Service (DDoS)
 DDoS is a more sophisticated and potentially damaging form of the DoS
attack. It is designed to saturate and overwhelm network links with
useless data. DDoS operates on a much larger scale than DoS attacks.
Brute Force
 A brute force attack is a hacking method that uses trial and error to
crack passwords, login credentials, and encryption keys. It is a simple
yet reliable tactic for gaining unauthorized access to individual accounts
and organizations' systems and networks.
C. Spyware, Tracking Cookies, Adware and
Pop-ups
Spyware
 Spyware is any program that gathers personal information from your computer without your
permission or knowledge. This information is sent to advertisers or others on the Internet and
can include passwords and account numbers.
Tracking Cookies
 Cookies are a form of spyware but are not always bad. They are used to record information
about an Internet user when they visit websites.
 Cookies may be useful or desirable by allowing personalization and other time saving
techniques. Many web sites require that cookies be enabled in order to allow the user to
connect.
Adware
 Adware is a form of spyware used to collect information about a user based on websites the
user visits. That information is then used for targeted advertising. Adware is commonly
installed by a user in exchange for a "free" product.
Pop-ups and pop-unders
 Pop-ups and pop-unders are additional advertising windows that display when visiting a web
site. Unlike Adware, pop-ups and pop-unders are not intended to collect information about the
user and are typically associated only with the web-site being visited.
 Pop-ups: open in front of the current browser window. Pop-unders: open behind the current
browser window.
 They can be annoying and usually advertise products or services that are undesirable.
D. Spam
 Spam is a serious network threat that can overload ISPs, email
servers and individual end- user systems.
 A person or organization responsible for sending spam is
called a spammer.
 Spammers can use hacking techniques, such as viruses,
worms and Trojan horses to take control of home computers.
II. Security Policy
 A security policy is a document that states in writing how a
company plans to protect its physical and information technology
(IT) assets.
 Security policies are living documents that are continuously
updated and changing as technologies, vulnerabilities and
security requirements change.
Security tools and applications
Some of the security tools and applications used in securing a network
include:
 Software patches and updates
 Virus protection
 Spyware protection
 Spam blockers
 Pop-up blockers
 Firewalls

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy