Sie sind auf Seite 1von 10

A

NATIONAL LEVEL PAPER PRESENTATION

A Paper On

Presented By

Vishal A. Gondane Vishal G. Ramteke


B.E. 3rd Year. Comp. Sci. & Engg. B.E 3rd Year. Comp. Sci. & Engg.
Email ID: - vishalag_2021@yahoo.co.in Email ID: - ramkteke.vishal@gmail.com
Contact number: - 9766859008 Contact number: - 9970353301

Babasaheb Naik College of Engineering,


Pusad 445215, Yavatmal (M.S.)
Abstract stronger security solutions. Solutions like
Information systems in corporations, Internet security utilities, email bulking,
government agencies and other enriched encryption, virtual keyboard,
organizations have undergone a steady digital signature etc. Those solutions are
evolution. Internet security is a fashionable only components of an overall security
and fast-moving field; the attacks that are system, they are vital components, and
catching the headlines can change organization must invest the time required to
significantly from one year to the next. evaluate the best system for their needs and
Regardless of whether they’re directly then deploy it as quickly as possible.
relevant to the work you do, network-based Security breaches are an ever-present
attacks are so high-profile that they are danger, and there’s no time like the present
likely to have some impact, even if you only to protect your company’s valuable data.
use hacker stories to get your client to
allocate increased budgets to counter the
more serious threats. The point is, some
knowledge of the subject is essential for the
working security engineer. There are several
fashionable ideas, such as that information
can be secured by new trends such as
internet utilities, email bulking, enriched
encryption, virtual keyboard, digital
signature etc.
Of course, many attacks are
presented in the media as network hacking
when they are actually done in more
traditional ways. Security breaches are very
real and very dangerous. Every company
now recognizes how easily it can become
the victim of deliberate or random attacks.
Network security professionals are aware of
the threats, and are developing better and

2
Contents
Introduction
• Introduction
A basic understanding of computer
• Threats affecting Information
networks is requisite in order to understand
Security
the principles of network security. An
1. E-mail Bombing
intruder with the right background and
2. Remote Keylogging software
malicious intent has many ways to infiltrate
3. Logic and Time bomb
internal company systems and network
Attacks
devices through the Internet connection.
4. Trojan Attacks
Once inside, the hacker has free reign to
5. Spyware Attacks
destroy, change, or steal data and these
6. Sniffing Attacks
actions because various sorts of network
• Network Securities
havoc. The most popular use of the Internet,
1. Internet Security Utilities
e-mail, is also insecure. The same hacker
2. E-mail spamming
with a protocol analyzer and access to
3. Enriched encryption format
routers and other network devices can
4. VPN Enhanced Security
intercept or change messages.
5. Virtual keyboard
The impressive development of
6. Hardware Firewall
computer networks has reached the point,
7. Digital Signature
where security becomes essential. Users
• Conclusion
want to exchange data in a secure way. The
• Bibliography
problem of network security is a complex
issue. Network security means a protection
of the network assets, which includes terms
like firewall, VPN enhanced security,
authentication, and cryptography. A firewall
is a barrier between two networks, an
internal network (trusted network) and an
external network (mistrusted network). A
VPN is a private data network that makes

3
use of the public network infrastructure. consisting of sending huge volumes of e-
Encryption is to encode data into human mail to an address in an attempt to overflow
unreadable format. Here the external the mailbox or overwhelm the server where
network is the Internet. Cryptography is the email address is hosted in a denial-of-
used to provide data integrity, entity service attack. There are two methods of
authentication and digital signatures. perpetrating an e-mail bomb, mass mailing
The benefits of connecting to the and list linking.
Internet are clear. This paper discusses the
risks you face when you connect to the Remote Keylogging softwares
Internet, describes the types of attacks that
Remote Keylogger offers users the
can occur, and offers an overview of firewall
ability to remotely monitor a computer via a
technology, which can protect your network
web browser, without even having physical
from hackers. Specifically, the paper
access to the PC. It will allow you to
discusses the implementation of a network
remotely install the monitoring system
securities and what you should consider in
through an email attachment without the PC
choosing the type of security you require.
user recognizing the installation at all. And
you can access the activity logs from
Threats in Information anywhere via you favorite web browser.

security Remote Keylogger comes with a


configuration program that allows you to
E-mail Bombing
create a remote install module that you e-
Abusers repeatedly sending an email
mail to the remote PC you wish to monitor.
message to a particular address at a specific
You must attach this file you create to an
victim site characterize email bombing. In
email, and then send it to the remote PC.
many instances, the messages will be large
From there the user must download and run
and constructed from meaningless data in an
the attached file to install Remote
effort to consume additional system and
Keylogger. You can choose to enable or
network resources. Multiple accounts at the
disable the 'alert user' option that Remote
target site may be abused, increasing the
Keylogger has. Once the user runs the file,
denial of service impact. In Internet usage,
their activities will be stored on our servers,
an e-mail bomb is a form of net abuse
so you can view them from any location -

4
securely, of course. To aid the install Trojan Attacks
process, you can give any name to the install Trojans are intelligent programs
module you create such as CoolPictures.exe made by the hackers act as a computer virus.
or FunGame.exe (it must always end with Trojans are small programs that effectively
the .exe extension to run). give “hackers” remote control over your
entire Computer. Hackers send Trojan on
Logic and Time bomb Attacks
the target machine, target machine operating
system, considers Trojan file is system file
A logic bomb is a piece of code
and hence OS don’t allow deleting it by an
intentionally inserted into a software system
anti-virus tool. Thereafter Trojans starts
that will set off a malicious function when
working, the Trojan program sends all the
specified conditions are met. For example, a
system information to the hacker. And here
programmer may hide a piece of code that
is the hacker got an access of the target
starts deleting files (such as the salary
system. Trojan attacks are very common and
database), should they ever leave the
old attack; there are so many anti-virus
company. Software that is inherently
utilities that trap Trojans, hence it is not so
malicious, such as viruses and worms, often
harmful for your system.
contain logic bombs that execute a certain
payload at a pre-defined time or when some
other condition is met. This technique can be Spyware Attacks
used by a virus or worm to gain momentum Spyware is also an intelligent
and spread before being noticed. Many program, which investigates your system
viruses attack their host systems on specific secretly and sends all the information back
dates, such as Friday the 13th or April Fool's to the hacker. There are so many Spyware
Day. Trojans that activate on certain dates programs available on the Internet. Spyware
are often called "time bombs". To be doesn’t consist of any virus code and hence
considered a logic bomb, the payload should it is not so much easy to detect them. Now
be unwanted and unknown to the user of the days Spyware attacks are very famous in
software. As an example, trial programs computer and mobile hacking.
with code that disables certain functionality
after a set time are not normally regarded as
logic bombs

5
Sniffing Attacks threats. Some of the famous software’s are

A sniffer is an application or device Norton Internet Security, etrust threat

that can read, monitor, and capture network management software, and Avira premium

data exchanges and packets. If the packets Internet security etc. These utilities are also

are not encrypted, a sniffer provides a full helpful to Spam Spyware and Trojans.

view of the data that is inside of the packet.


Even encapsulated (tunneled) packets can be
opened and read if they are not encrypted.
Using a sniffer, an attacker can do the
following:
• Analyze network and access
information, eventually causing the
network to stop responding or
become corrupted.
• Read private communications.

Trends in information
Securities
Why Securities are essential?
Today’s world is fast growing in Internet
area and criminal minds take its misuse to
explore their negative thinking ideas and
terrorism.

How to overcome it?


Internet Security Utilities
They’re so many utilities available
on the Internet and very powerful to protect
your system against vulnerabilities and

6
Data that can be read and understood

E-mail spamming without any special measures is called


plaintext or clear text. The method of
E-mail spam, also known as "bulk e-
disguising plaintext in such a way as to hide
mail" or "junk e-mail," is a subset of spam
its substance is called encryption.
that involves nearly identical messages sent
Encrypting plaintext results in unreadable
to numerous recipients by e-mail. A
format called cipher text. The process of
common synonym for spam is unsolicited
reverting cipher text to its original plaintext
bulk e-mail (UBE). Definitions of spam
is called decryption
usually include the aspects that email is
unsolicited and sent in bulk "UCE" refers
specifically to "unsolicited commercial e-
mail.". E-mail spam slowly but
exponentially grew for several decades to
several billion messages a day. Spam has
frustrated, confused, and annoyed e-mail
users. Laws against spam have been Encryption and Decryption

sporadically implemented, with some being


opt-out and others requiring opt in e-mail. VPN enhanced security
The total volume of spam (over 100 billion Virtual private network (VPN)
emails per day as of April 2008) has leveled connections enabled with PPTP and L2TP
off slightly in recent years, and is no longer are authenticated by using PPP user-level
growing exponentially. The amount received authentication methods. These include
by most e-mail users has decreased, mostly Password Authentication Protocol (PAP),
because of better filtering. About 80% of all Challenge Handshake Authentication
spam is sent by fewer than 200 spammers. Protocol (CHAP), Shiva Password
Botnets, networks of virus infected Authentication Protocol (SPAP), Microsoft
computers, are used to send about 80% of Challenge Authentication Protocol (MS-
spam. CHAP), and optionally, Extensible
Authentication Protocol (EAP).
Enriched encryption format

7
By using the new Extensible Authentication In some environments, data is so
Protocol (EAP) and Internet Protocol sensitive that it needs to be physically
security (IPsec) security options, a virtual separated, and hidden, from the majority of
private network provides enhanced security corporate users. Finance or human resources
for remote users. For example, if your data are examples of this type of data.
remote access server has been configured to Corporations can use VPN connections
require EAP for authorization, the highest through a VPN server to physically separate
level of authentication is enforced for the extremely sensitive data servers, yet allow
dial-up or virtual network connections of the secure access to the data by selected users.
remote access server. By taking advantage Users on the corporate intranet who have
of Point-to-Point Protocol (PPP) been granted the appropriate permissions
authentication and encryption options, can establish a remote client VPN
defining PPTP filtering on your remote connection with the VPN server and can
access server, and restricting remote access access the protected resources of the
servers on the Internet to only accept sensitive department network. Additionally,
authenticated PPTP clients who encrypt all communication across the VPN is
data, your system administrator can tighten encrypted for data confidentiality. Users
data security and manage remote users much who do not have proper permissions to
more efficiently. establish a VPN with the VPN server cannot
see the hidden server.

8
Virtual keyboard Digital signature

A virtual keyboard is a software In digital signature instead of


and/or hardware component that allows a encrypting information using someone else's
user to enter characters. A virtual keyboard public key, you encrypt it with your private
can usually be operated with multiple input key. Public key digital signatures provide
devices, which may include an actual authentication and data integrity. A digital
keyboard, a computer mouse, a headmouse, signature also provides non-repudiation,
and an eyemouse. On a desktop PC, the which means that it prevents the sender from
primary purpose of a virtual keyboard is to claiming that he or she did not actually send
provide an alternative mechanism for the information. If the information can be
disabled users that can not use a physical decrypted with your public key, then it must
keyboard. have originated with you. Thus digital
signature serves the same purpose as a
Hardware Firewall handwritten signature.

A hardware firewall is a small metal


box filled with the plugs openings, or ports.
You hook your computer into the box and
then set it up on your computer, just as you
would new printer or other peripheral.
Because it’s not physiaclly on your machine,
a hardware firewall is somewhat vulnerable
than a software firewall. You could look at a
hardware firewall as a mini computer, and Conclusion
the price of hardware firewall reflects this Everyone has a different idea of what
difference, Hardware firewalls are typically ``security'' is, and what levels of risk are
owned by larger bussiness. acceptable. It's important to build systems
and networks in such a way that the user is
not constantly reminded of the security
system around him. As and when new
security methods are developed, breaking of

9
these methods has increased. So measures these preventive and protective measures are
have to be taken to fill the loopholes. implemented properly. Hence, the best way
Technologies such as Proxy Servers to thwart malicious is to stay one step ahead
and Firewalls will always be there, but of them.
security can never be asserted till the time

Digital Signature

References
www.guruji.com
www.packetstormsecurity.com
www.hackingmobilephones.com
www.howstuffworks.com
www.google.com
www.webopedia.com
www.networksecurityassults.com
www.securityadviser.com
www.opendns.com

10

Das könnte Ihnen auch gefallen