#4 Network Security
#4 Network Security
Information
communication
Technology
Advanced
Networking
Introduction to
Network Security
Kalayu N.
2015 E.C
I. Networking Threats
Common network security threats include malicious software (malware),
phishing schemes, Distributed Denial of Service (DDoS). Many network
security issues create the additional risk of regulatory non-compliance.
External Threats
External threats arise from individuals working outside of an
organization. They do not have authorized access to the computer
systems or network. External attackers work their way into a
network mainly from the Internet, wireless links or dialup access
servers.
Internal Threats
Internal threats occur when someone has authorized access to the
network through a user account or have physical access to the
network equipment. The internal attacker knows the internal politics
and people. They often know what information is both valuable and
vulnerable and how to get to it.
Social Engineering and Phishing
Social engineering is a term refers to all techniques aimed at talking a target into
revealing specific information or performing a specific action for illegitimate reasons.
Three of the most commonly used techniques in social engineering are:
pretexting, phishing, and vishing.
Pretexting
Pretexting is a form of social engineering where an invented scenario (the pretext) is
used on a victim in order to get the victim to release information or perform an
action. The target is typically contacted over the telephone.
Phishing
Phishing is a form of social engineering where the phisher pretends to represent a
legitimate outside organization. They typically contact the target individual (the
phishee) via email.
Vishing / Phone Phishing
A new form of social engineering that uses Voice over IP (VoIP) is known as vishing.
With vishing, an unsuspecting user is sent a voice mail instructing them to call a
number which appears to be a legitimate telephone-banking service.
Method of attack
A. Viruses, Worms and Trojan horses
1. Virus
A computer virus is a type of malicious software, or malware, that spreads between computers
and causes damage to data and software. Computer viruses aim to disrupt systems, cause major
operational issues, and result in data loss and leakage.
1) File infector viruses: File infector viruses infect program files. These viruses normally infect
executable code, such as .com and .exe files. They can infect other files when an infected
program is run from floppy, hard drive, or from the network. Many of these viruses are memory
resident. After memory becomes infected, any non-infected executable that runs becomes
infected
2) Boot sector viruses: Boot sector viruses infect the system area of a disk; that is, the boot
record on floppy disks and hard disks.
3) Master boot record viruses: Master boot record viruses are memory-resident viruses that
infect disks in the same manner as boot sector viruses. The difference between these two virus
types is where the viral code is located. Master boot record infectors normally save a legitimate
copy of the master boot record in a different location.
4) Multipartite viruses: Multipartite (also known as polypartite) viruses infect both boot
records and program files. These are particularly difficult to repair. If the boot area is cleaned,
but the files are not, the boot area will be re-infected.
Cont.….
2. Worms
A worm is similar to a virus by design and is considered to be a sub-class
of a virus.
A computer worm is a type of malware whose primary function is to self-
replicate and infect other computers while remaining active on infected
systems.
A worm uses the network to send copies of itself to any connected hosts.
3. Trojan Horses
A Trojan horse is a non-self replicating program that is written to appear
like a legitimate program, when in fact it is an attack tool.
B. Denial of Service and Brute force Attack