Top Banner
NETWORK SECURITY
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network security

NETWORK SECURITY

Page 2: Network security

INTRODUCTION Network security in simple word refers in to any

activities designed to protect our network.

Specifically, these activities protect the and of our network

and data.

Network security must be followed by a network administrator to protect the network devices from threats and simultaneously, the unauthorized users must be prevented from accessing the network.

usability, reliability,

integrity

safety

Page 3: Network security

ATTACKING SCHEMATICS

INFORMATION SOURCE

INFORMATION DESTINATION

1.INTERRUPTION 2.INTERCEPTION

3.MODIFICATION 4.FABRICATION

NORMALFLOW

Page 4: Network security

VULNERABILITIES Vulnerability is a weakness which allows an attacker to reduce a

network’s information assurance.

Vulnerability is the intersection of three elements:• A system flaw • Attacker’s access to the flaw• Attacker’s capability to exploit the flaw.

Types of vulnerabilities include:• Man in the middle• SQL Injection• Denial of service attack• Cyber Attack• IP Address Spoofing

Page 5: Network security

MAN IN THE MIDDLE

Man in the middle (often abbreviated MITM) is one of the attack in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

Page 6: Network security

For example, an attacker within reception range of an unencrypted network access point can insert himself as a man-in-the-middle.

In the above figure, there is an unencrypted network connection between two users. It allows an attacker(an another user) to access the connection between the two users which maintain instability in the network.

Page 7: Network security

SQL INJECTION

SQL Injection is the other vulnerability where hackers steal the data from organizations.

It is the type of attack that takes advantage of improper coding of our web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within our database.

Page 8: Network security

For example, a login page where a legitimate user would enter his username and password to view his personal details or upload his comments in a forum.

When the legitimate user submits his details, an SQL query is generated from these details and submitted to the database for verification. If valid, the user is allowed access.

Through SQL Injection, the hacker may input specifically crafted SQL commands with the intent of bypassing the login form barrier.

Page 9: Network security

PREVENTING THE VULNERABILTY

Hackers or attackers are always looking for weaker points in a network system to hack the security system and get hold of confidential and new information.

This menace can be prevented to a great extent if proper security measures are taken at the right time.

Page 10: Network security

Some of them include:• Change default password

Some software has built-in password to allow the first log in after installation, it is extremely unwise to leave it unchanged.

• Implement and use password policies By having passwords of characters which are of secure length and

relatively easy to remember. Passwords must be changed in every 60 days. The password should also be made up of both alpha and numeric characters to make it more unique.

• Ensure physical security Apart from ensuring the internal security of the network, we need to think about the physical security too. We must be aware of our organization’s security which helps to avoid any intruder from being using the confidential information or data.

Page 11: Network security

Configure firewalls A firewall if not configured properly can act like an open door for

any intruder. Hence it is vitally important to set the rules to allow traffic through the firewall that is important to perform our business or any confidential transactions.

Page 12: Network security

Delete comments in website source code• Comments used in source code may contain indirect information

that can help to crack the site, sometimes even usernames and passwords. All the comments in source code that look inaccessible to external users should also be removed as there are some techniques to view the source code of nearly all web applications.

Page 13: Network security

Install anti-virus software• Anti-virus software must be updated regularly and if possible on

a daily basis. The updated version of anti-virus software is necessary as it helps in detecting even the latest virus. There are various anti-virus software’s, that must be legally installed to protect our system from unprofitable damage caused due to attacks done by the viruses.

Page 14: Network security

CONCLUSION Comprehensive lists of hackers have the ability

and the skill to hack the system for gaining an access over our vital information and data by any means.

Therefore the most important matter of concern is to indulge a security in our organization or any firm to prevent such intruders to do so.

Page 15: Network security

Thank You…!!!