230 likes | 472 Views
NETWORK SECURITY. For more notes and topics visit: www.eITnotes.com. Network:. A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks. Security. Security is “ Freedom from risk or danger . “
E N D
NETWORK SECURITY For more notes and topics visit: www.eITnotes.com eITnotes.com
Network: A Network is a series of points or nodes interconnected by communication paths. Interconnect with other networks and contain sub networks. eITnotes.com
Security Security is “Freedom from risk or danger.“ • The ability of a system to protect information and system resources with respect to confidentiality and integrity. eITnotes.com
Network security: • Any activities designed to protect your network . • Target- variety of threats and stops them from entering or spreading on your network. • Handled by a network administrator. eITnotes.com
Need For Network Security To ensure that -: • information on a network remains SECURED • information we passed should not be LOST • the information should not be DELAYED • hackers and crackers do not access your information eITnotes.com
Need For Network Security Session Hijacking Worms Viruses Trojans Replay Attack Buffer Overflows Denial of Service Man-in-the-middlee 6 Spoofing eITnotes.com
Who is vulnerable? • Financial institutions and banks • Internet service providers • Pharmaceutical companies • Government and defense agencies • Contractors to various government agencies • Multinational corporations • ANYONE ON THE NETWORK eITnotes.com
Common Security Attacks • IP Spoofing • Sniffing • Trojans • DoS/DDoS Attacks • Social Engineering eITnotes.com
IP Spoofing • Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source. eITnotes.com
PacketSniffing • Recall how Ethernet works … • When someone wants to send a packet to some else … • They put the bits on the wire with the destination MAC address … • And remember that other hosts are listening on the wire to detect for collisions … • It couldn’t get any easier to figure out what data is being transmitted over the network! eITnotes.com
Trojans • These are programs that look like ordinary software, but actually perform unintended or malicious actions behind the scenes when launched. Most remote control spyware programs are of this type. The number of Trojan techniques are only limited by the attacker's imagination. A Torjanizes file will look, operate, and appear to be the same size as the compromised system file. eITnotes.com
DoS/DDoS {Denial of Service} • Denial of Service attack on a network is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service can result when a system, such as a Web server, has been flooded with illegitimate requests, thus making it impossible to respond to real requests or task. Yahoo! and e-bay were both victims of such attacks in February 2000. eITnotes.com
Social Engineering Social Engineering Involves… • Faked Email : The social engineer sends a message to one or more users in a domain that "this is the system administrator and your password must be reset to user 123 " for a temporary period of time. The hacker then continuously monitors for the change and then exploits the whole system. • Fictitious Competition : The social engineer manipulates a group of users to participate in some fake competition for a jackpot prize, with the ultimate purpose of eventually extracting confidential information about network and password security. eITnotes.com
NETWORK SECURITY TOOLS • Anti-virus and anti-spyware • Firewall • Intrusion detection and prevention systems • Encryption eITnotes.com
ANTI VIRUS AND ANTI SPYWARE • Vulnerability to virus , malware, threats etc. • Scans every file being used by the system. • Repair or delete the infected files. eITnotes.com
Firewall: • A typical border control mechanism. • Metaphor for network security. • Designed to prevent unauthorized access to or from a private network. eITnotes.com
Intrusion Detection and Prevention Systems (IDPS) • BARC has developed a Web based Security Monitoring & Intrusion Detection And Prevention System • For monitoring security of routers, all Internet connected servers and related software packages on a continuous basis. • This software tool can detect network attacks in real-time by analyzing various log files and known signatures • It allows system administrator to take appropriate corrective action before any damage to information can be caused by setting an alarm eITnotes.com
Advantages of Network Security Protects personal data of clients on network. Protects information been shared between computers on the network. Protects confidential data of the organization from being altered or read. eITnotes.com
Security related URLs • http://www.robertgraham.com/pubs/network-intrusion-detection.html • http://online.securityfocus.com/infocus/1527 • http://www.snort.org/ • http://www.cert.org/ • http://www.nmap.org/ • http://grc.com/dos/grcdos.htm • http://lcamtuf.coredump.cx/newtcp/ eITnotes.com
THANK YOU eITnotes.com