Sie sind auf Seite 1von 16

Network Security

ESSAYCORP
www.essaycorp.com

A Brief History of the World

Overview

What is Network?
What is Network Security?
Why do we need security?
Who is vulnerable to security attacks?
Types of Attacks
Some common Security Attacks
Firewalls
Types of Firewalls
Intrusion Detection System
Denial of Service
Social Problems
Conclusions
3

WHAT IS NETWORK ?
A network is a collection of two or more computers that are
linked in order to share resources (such as printers and CDs),
exchange files, or allow electronic communications. The
computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

WHAT IS NETWORK
Network
Security is the practice to prevent and monitor
SECURITY?

unauthorized access, misuse, modification and denial of a


computer network. It involves the authorization of access to
data in a network which is controlled by administrator. Users
are assigned an ID and password to access the information.

WHY DO WE NEED SECURITY?

It protect vital information while still allowing access to those


to those who need it (for example trade secrets,
medical records etc).
Provide authentication and access control for resources.
Guarantee availability of resources.

WHO IS VULNERABLE TO THE


SECURITY ATTACKS ?

Financial Institutions and Banks


Pharmaceutical Companies
Internet Service Providers
Contractors to various government agencies
Government and Defence Agencies
Multinational Companies
And anyone on the network

TYPES OF ATTACKS
Attacks can be from two categories :
PASSIVE When a network intruder intercepts data travelling
through a network.
ACTIVE

When an intruder initiates commands to disrupt the

networks normal operation.

SOME COMMON SECURITY ATTACKS


FIREWALLS
-finding a way into the network
INTRUSION DETECTION SYSTEMS
-Exploiting software bugs, buffer overflows
DENIAL OF SERVICE
-Ingress filtering, IDS
SOCIAL PROBLEMS
-Education

FIREWALLS

A firewall is a network security system, that controls


incoming and outgoing network traffic based on a set of
rules.
Acting as a barrier between a trusted network and other
untrusted networks.

10

TYPES OF FIREWALLS
PACKET FILTERING - Data travels on the internet in small
packets. Each packet has certain metadata attached, like
where it is coming from, and where it should be sent to. Based
on rules, certain packets are then dropped or rejected.

11

STATEFUL FIREWALLS
This kind of firewall also keeps track of connections. A packet
can be the start of a new connection, or it can be part of an
existing connection. If it is neither of the two, it is probably
useless and can be dropped.

12

APPLICATION LAYER FIREWALL


It does not only look at the metadata but also look at the actual
data transported.

13

Denial of Service

Its purpose is to make a network service unusable, usually


by overloading the server or network.
Many different kinds of DOS attacks
SYN flooding
SMURF
Distributed attacks
Mini Case Study: Code-Red

14

Social Problems

People can be just as dangerous as unprotected computer


systems.
People can be lied to, manipulated, bribed, threatened,
harmed, tortured, etc. to give up valuable information.
Most humans will breakdown once they are at the harmed
stage, unless they have been specially trained.

15

Conclusions

The Internet works only because we implicitly trust one


another.
It is very easy to exploit this trust.
The same holds true for software.
It is important to stay on top of th.e latest CERT security
advisories to know how to patch any security holes.

16