1
NETWORK SECURITY-The Present Day Need…
Computer Network
Interconnection of
two or more
computers that are
connected with one
another for purpose
of communicating
data electronically.
2
NETWORK SECURITY-The Present Day Need…
Security Violation
Computer or network
security violates
when there occurs an
illegal access by any
party .
3
NETWORK SECURITY-The Present Day Need…
Why Security?
Computer security is required because most
organizations can be damaged by hostile
software or intruders. These include:
Damage or destruction of computer systems.
Damage or destruction of internal data.
Loss of sensitive information to unfriendly
parties.
Damage to the reputation of an organization.
4
NETWORK SECURITY-The Present Day Need…
Security Goals
Privacy or
confidentiality
Data integrity
Authentication and
Non-repudiation
5
NETWORK SECURITY-The Present Day Need…
Security Goals
It is a service used to keep
the content of information
secret from all, but those Privacy
authorized to have it. There Data integrity
are numerous approaches
Authentication
to providing confidentiality,
ranging from physical Non-repudiation
Protection by means of
mathematical algorithms
6
NETWORK SECURITY-The Present Day Need…
Security Goals
Data integrity is a
service which addresses Privacy
unauthorized alteration Data integrity
of data. Data Authentication
manipulation includes Non-repudiation
such things as insertion,
deletion & substitution.
7
NETWORK SECURITY-The Present Day Need…
Security Goals
Two parties entering into a communication
should identify each other.
Privacy
Data integrity
Authentication
Non-repudiation
8
NETWORK SECURITY-The Present Day Need…
Security Goals
Non-repudiation is a Privacy
service which prevents
Data integrity
an entity from denying
previous commitments Authentication
or actions. Non-repudiation
9
NETWORK SECURITY-The Present Day Need…
Types Of Security
Physical security::::: It Layered security :::::
means protection by It includes virus
tangible means. These protection,
include sensor devices protecting the most
that report unauthorized dangerous types of
removal of items, e-mail attachments
devices that can scan (the code red virus)
premises at night . from unrecognized
viruses and other
hostile software. 10
SECURITY THREATS
• A threat is a potential violation of security
• These are flaws in design, implementation,
and operation. It is a circumstance, event,
or condition with the potential to cause harm
to personnel and/or network resources in the
form of destruction, modification of data,
and/or fraud, waste, and abuse.
11
TYPES OF SECURITY THREATS
• DENIAL OF SERVICE.
• EAVESDROPPING
• UNAUTHORIZED ACCESS
• CONFIDENTIALITY BREACHES
• PACKET REPLAY
• PACKET MODIFICATION
12
Security attacks
An attack is any action that violates security
There are two types of attacks:
• ACTIVE ATTACK: It is an attack on a computer network
with the intent to insert
delete, modify data. It cannot be prevented
but detected and recovered.
• PASSIVE ATTACK: It is an attack on a computer
network with the intent to monitor network data
transmission to read messages or analyze traffic. Here
the emphasis is on prevention rather than detection.
13
Security Attacks
And Techniques
TECHNIQUES
•ATTACKS
Cryptography
• Viruses & Worms
Firewalls
Password attack
14
VIRUSES & WORMS
A virus consists of a set of instructions that
attaches itself to other computer programs.
Usually virus will spread before it will do
anything that may alert the user to its
presence.
Eg::: C-Brain, Macmag , Com Exe
A worm attaches itself to e-mail msg & infects
a comp. when you open the e-mail or
attachment
Eg::: Navidad worm, lifestages and I love you
15
NETWORK SECURITY-The Present Day Need…
Trojan horse attack
Trojan horse software
is software that
appears to have some
useful function, but
some hidden purpose
awaits inside.
16
NETWORK SECURITY-The Present Day Need…
Logic bombs
A logic bomb consists of hidden
instructions, often introduced
with the Trojan horse
technique, that stay dormant
until a specific event occurs, at
which time the instructions are
activated.
17
NETWORK SECURITY-The Present Day Need…
Password Attack
Passwords are a primary piece of information
that intruders will try to acquire in order to gain
unauthorized access to systems or networks .
Passwords should be chosen wisely and a
dictionary word should never be used.
The complexity requirements should include:::
-Lowercase
-Uppercase
-Numbers
-Special characters such as !@#$%^&*(){}[]
18
NETWORK SECURITY-The Present Day Need…
Password Policy
Logon passwords must be changed at least
every 90 days (30-60 days recommended).
Passwords must be at least 8 characters long
and use at least two numbers.
Passwords must be kept secret and not written
down.
Don't let programs save passwords.
Remember a sentence and go for options like
first letter of each word.
19
NETWORK SECURITY-The Present Day Need…
CRYPTOGRAPHY
Cryptography is the science of writing messages
that no one except the intended receiver
can read. “Cryptanalysis” is the science of reading
them anyway.
20
Network Firewall
The term firewall is used to refer to any
hardware or software that acts as a barrier
between connected networks. It can be a
router, gateway or special purpose computer
that monitors and controls the flow of data
between networks. A firewall functions as a
gatekeeper, monitoring and controlling what
information enters and leaves a network.
21
Network Firewall (contd..)
A firewall filters the traffic flowing between an
internal private network (trusted) and an
external public network (untrusted) in order to
protect the internal network. It is interesting
to note that a firewall not only protects the
internal network from attacks from the
outside , but it also filters what data can leave
the network as well.
22
Network security tools
• Antivirus software packages
• Secure network infrastructure
• Virtual private network
• Identity services
• Encryption
FACT: None of these tools alone will be
sufficient to protect a network, but when they
are layered together, they can be highly
effective in keeping a network safe from
attacks and other threats to security
23
NETWORK SECURITY-The Present Day Need…
Precautions
User Education
Do not open mail from unknown originators.
When opening the file, first open it in a plain
text editor such as Notepad to be sure it is
really a text file.
Update Software Security Patches .
Don’t hide the extensions of files.
Approved Software.
24
NETWORK SECURITY-The Present Day Need…
CONCLUSION
Computer security is almost a statistical game.
It can reduce but not eliminate the chance that
we may be penetrated by an intruder or virus.
It is considered that an operating system
without a network interface can be completely
secure, but even this cannot be guaranteed.
We can opt the methods to reduce , since it is
impossible to eliminate all security violations as
crackers always appear to be one step ahead of
security experts!
Prevention is better than cure.
25
THANKS
26
27
???????Any Queries???????
28