Professional Documents
Culture Documents
Adobe Scan Apr 14, 2023
Adobe Scan Apr 14, 2023
As a general principle, network security involves securing huge amounts of data and networks
in layers. This ensures the compliance with rules and regulations that have to be acknowiedged
before any action can be taken on the data. These levels are:
1. Physical
2. Technical
3. Administrative
1. Physical Network Security :- This is the most basic level of network securitythat protects data
and network confidentiality by preventing unauthorized personnel from acquiring control over
the network. It may be necessary to use external peripherals and routers for cable connections.
It is possible to achieve the same results by using devices such as biometric systems.
2. Technical Network Security - Its primary focus is on protecting data that is stored in the
network or data that is transported through the network. It serves two purposes. The first is to
protect against unauthorized users, and the second is to protect against malicious activities.
3. Administrative Network Security:- In this level of network security, user behavior is protected,
such as how permissions are granted and how authorization is performed. Moreover, it ensures
the level of sophistication the network might need for protection against all attacks. As a result
of this level, infrastructure amendments are also recommended.
5.1.2 TYPES OF NETWORK SECURITY
The choice of security policies and tools varies from network to networkand changes over time.
The following are some commonly used types of network security tools and software:
1. Access Control :- The purpose of this method is to restrict access to network applications and
systems to a specific group of users and devices. These systems deny access to unconfirmed
users and devices.
2. Antivirus and Anti-malware Software :- The purpose of antivirus and antimalware software is
to detect, remove or prevent viruses and malware infecting a computer or network, such 35
Trojan horses, ransomware and spyware.
(ibmputer-Networking I07
Cloud Security - Currently, many organizations are using cloud technology to store a large
amount of important data. This is very vulnerable to malpractices committed by a few
unauthorized dealers. The data must be protected and no compromise should be made to this
protection. The cloud provider manages the security of its overall infrastructure and offers tools
for users protect their instances within the overal infrastructure, For exarnple, Amazon
to
cloud
Web Services provides security groups that control the incoming and outgoing tralfic associated
withan application or
resource.
Behaviorallanalytics :- This
4.for abnormal method analyzes network behavior and detects and alerts organizations
activity.
4. Masquerades
For example, if we say Ihave a password for my Gmail account but someone saw while Iw2s
doing a login into Gmail account. In that case my password has been compromised and
Confidentiality has been breached and compromised.
5.1.5 INTEGRITY
Integrity refers to maintaining accuracy and completeness of data. This means data cannot be
edited in an unauthorized way by any unauthorized party.
It specifies that content of the message must not be altered during transmission from
sender
to receiver and ensures information non-repudiation and authenticity. The data can't be
changed
except by an authorized entity. It ensures that only authorized parties are able to modify
Computer system assets and transmitted information.
Modification includes writing, changing status, deleting, creating and delaying or replaying of
transmitted messages.
Two types of integrity services :
1. Connection oriented integrity service: It provides integrity of all user
data on a
detects any modification, insertion, deletion or reply of any data within entire connection and
data sequence.
It provides protection against message stream modification and
denial of-service.
2. Connection less integrity service: It generally provides
protection against
only. To maintain data integrity, there should be resistance to the changemessage modification
and replacement of
data.
For example if an employee leaves an organization then in that case data for that
all departments like accounts, should be updated to reflect status to JOB
employee in
LEFT so that data is
complete and accurate and in addition to this only authorized person should be allowed to edit
employee data.
Computer Networking 109
s.1.6 AVAILABILITY
Availability means that the
systems and data. It is the network shouldbe readily avallable to its users. It also applies to
hardware, make
regular upgrades, implement network administrator's
responsibility
fail-over plans, and prevent to maintain
bottlenecks in a network to ensure
availability.
Anetwork may become unavailable as a result of attacks such as DoS or DDoS. Therefore, proper
measures should be taken to prevent such so that asthey do not have a
significant impact on the companies attackswhofrom
and users occurring
rely on the network a business tool.
Information needs to be constantly changpd which means it must be accessible to authorized
entities. The unavailability of information is just as harmful for an organization as the lack of
confidentiality or integrity.
Example: Ihe situation can be difficult for a bank if the custonmer could not access their accounts
for transactions. Interruption puts the
availability of resources in danger.
|Confideotiality Integrity
Availability
Sccure System
The diagram above explains the balance concept. The right balance of the three goals is needed
tobuild a secure system. If the goals are not balahced then a small hole is created for attackers
to nullify the other objectives of security. Having a highly confidential system but low availability
then the system is not secure.
Understand CIA Triad with the help of ATM example:
In order to better understand how the CIA Triad works in practice, consider the ATM that
enables users to access their bank balance and other information. ATMs incorporate the following
measures to cover the tried's principles:
Before granting access to sensitive data, the two-factor authentication (debit card with
PIN
code) ensures confidentiality.
software
By maintaining all withdrawals and transfers made via the ATM, the ATM and bank
ensure data integrity.
times.
Due to its availability and accessibility, the ATM is available to the general public at all
110
Avirusis a software programs or pieces of code that is capable of copying itself and infecting
one
a system without the knowledge of the user. It is a type of malware that spreads from
Computer to another cleaning up its trails as it goes. It can harm other software programs by
modifying them and it is a type of malware.
Generally viruses are attached to the executable (.exe) files and when user runs that program
viruses spread in tne system. They may create mild effects and can cause crash or ddta a
software may cause denial-of-service attack. Viruses may infect memory, a floppy iSK, a nard
drive, a backup tape, or any other type of storage.
ypes of viruses are as under:
1. Parasitic Virus.
2. Memory Resident Virus.
3. Boot sector Virus.
4. Stealth Virus.
5. Metamorphic Virus.
5. Macro Virus.
6. Resident Virus
7. Multipartite Virus
8. Direct Action
9. Browser Hijacker
Ihe following are the harmful effects of viruses:
1. Erase data
the network. Intruders may be insiders or may be outsiders. Intruders attacks range from the
gentleto the serious one.
ntrudersare mainly classified into
three categorles :
Masquerade: An individual who is not
access to the
1. computersystem and exploit (misuse authorized to use the computer but he gets
or take advantage of) user data and account.
2. Misfeasor: A legal user who accesses data, programs or resources for which he is not authorized.
3. Faking
4. Theft of i9ortant credentials
ComputerNetworking
115
5. Financial fraud
What can be done to prevent cyber crimes
Back up all data and committed by criminal organizations?
2. Updating and enforcingconsiconcrete
3. Keep your personal
derations
security
innformation
4. Anti-cybercrime settings private
5. Using antivirus software
6 Keep your
intormation secure when visiting unauthorized sites
1. Use virtual pr0vate networks
o Keeping your most
valuable data secure
5.2.6 TERRORISTS
Acyber terrorist uses Internet networks to conduct vinlent incidents. such as loss of life
to gain political advantage by giving threats to the community. To accomplish their goals,orhackers
data,
use computer viruses, spyware, málware, ransomware, phishing, and
scripts. programming language
cyber terrorists might have ethical or religious reasons for wanting to terrorize and others do
it for personal reason. Cyber terrorism is sometimes referred to as electronic
terrorism or
information war.
The following are the Harm caused by Terrorists :
1. Violence
2. Service disruptions
3. Physical damages
4. Psychosocial impacts
5. Economic damages
6. Data breaches.
How to prevent Cyber Terrorism :
1. Ensure all devices are protected with Antivirus
2. Set up multi-factor authentication
3. Choose strong passwords
4. Avoid Phishing scams
5. Shop at safe web_ites
6. Check website URL
|5.2.7 INFORMATION WARFARE
Information warfare is the use and management of information and communication technology
war against
(ICT) in order to obtain a competitive advantage over a competitor. It's actually a
equipment.
the enemy's information and informatjon processing
and cyberattack.
Information warfare is also known as cyberwarfare, electronic warfare,
116
electricity, oil and gas refineries and
Computer Networking
distribution,
Information warfare targets water,
finance, and telecommunications. banking and
attack :
Following are seven types of Information Warfare
1. Espionage
2. Sabotage
3. Denial-of-service (DoS) Attacks
4. Electrical Power Grid
5. Propaganda Attacks
6. Economic Disruption
7. Surprise Attacks
How to prevent Information Warfare :
1. Mailfence.
2. Digitally sign your emails with OpenPGP signatures to further secure your messages.
3. Use of avirtual machine.
5.3 FIREWALLS
Nowadays, it is a big challenge to protect our sensitive data from unwanted and
sources. In order to keep our private information safe and secure, we can use a unauthorized
and devices. One such tool is a firewall', which provides variety of tools
our data and computers from unauthorized access.
various levels of security and protects
A firewall is a network security device or
software
and outgoing network traffic based on adefined setprogram that monitors and filters incoming
of security rules. Basically, a firewall acts
as a barrier between a private internal
network and the public Internet.
Firewalls are designed primarily to allow
unwanted traffic for- protecting computers fromnon-threatening traffic and prevent malicious or
network traffic and prevents malicious software from viruses. It is a cybersecurity tool that filters
is infected. accessing the Internet on a computer that
Firewall
LAN WAN
All traffic from or to the internal network must pass through the firewal. This is achieved
by physically blocking all access to the local network except via the firewall.
Only authorized traffic, as defined by the local security policy, will be allowed to pass. This
can be achieved by using the suitable firewall type.
Firewall can filter packets based on their source and destination addresS and port numbers.
This is known as packet filtering.
Firewalls serve many purposes besides security. They configure domain names and Internet
Protocol (IP) addresses. They can translate network addresses. They can monitor internet
usage.
Ising firewalls as a Security system is obviously beneficial: however. firewalls have some limitationS.
Afirewalldoes notprevent users from accessing malicious websites,which makes it vulnerable
to internal threats and attacks.
Afirewall cannot prevent the transmission of files or software infected with viruses.
It is not possible to prevent the misuse of passwords by firewalls.
Afirewall cannot protect an organization if the security rules are incorrectly configured.
Firewalls cannot provide protection against non-technical security threats, such as social
engineering.
Systems that are already infected cannot be protected by firewalls.
5.3.7 REAL- TIME APPLICATIONS OF FIREWALL
Corporate networks: Firewalls allow authorized users to access particular resources or services
and block traffic from specific IP addresses or networks.
Government organizations: It is possible that they will make use of cutting-edge firewalls
such as Next-generation firewalls (NGFW), which are capable of detecting and stopping
intrusions, as well as managing access to specific apps and data.
Service providers: ISPs, cloud service providers, and hosting companies use firewalls to
safeguard their'networks and the data of their customers.
Small eterprises: These firms may use firewalis to separate their internal networks, restrict
access to specific applications and resources, and protect their networks against external
threats.
Industrial Control Systems (ICS): In power plants, water treatment facilities, and transportation
systems, firewalls protect control systems against unauthorized access and cyber-attacks.
120
Computer Networking
5.3.8 WORKING
The firewall system analyzes network traffic according to pre-defined rules. It then fiters the
traffic and prevents any unreliable or suspicious traffic. It only lets in traffic selected as acceptahie
by the user.
As a securitymeasure, firewalls can allow or block data packets based on predefined securh
rules. Incoming traffic is allowed only via trusted IP addresses, or sources.
It distinguishes between positive and malicious traffic and either allows or blocks specific data
packets according to pre-established security rules.
Several aspects of packet data are taken into account when deciding these rules, such as the
source, destination, and content of the packet. They block traffic coming from suspicious sources
to prevent cyberattacks.
For example, figure 5.3 shows how a firewall allows good traffic to pass to the user's
network.
private
B Good
Allowed
Good
Traffic Traffic
Bad
Traffic Firewall
blocked
bad
traffic
Internet
Firewal! Private Network
security.
1. Write benefits of network
security.
2. List out types of network
confidentiality, Integrity and Availability.
3. Define the term
detail.
4. Explain confidentiality in
122