Network Security - Overview

December 27, 2015    

Hi Folks, 
We'll start with overview of network security today, relevant components of this topic will be covered in upcoming articles. Any doubts or suggestions- do use comments section!
Network Security
==> This article is a part of PK Series (IT Officers)

What is Network Security?

Network Security is the protection of the access to files and directories in a computer network against hacking, misuse and unauthorized changes to system. A simple example of network security is an anti-virus application that we use in our computers. 
Kinds of security elements required are:
1. Authentication - process of reliably verifying the identity of someone by means of a password, smart card, bio metrics etc.
2. Confidentiality - Protecting information from being read or copied by anyone who is not explicitly authorized by owner of that information.
3. Integrity - Protecting information from being deleted or altered in any way without permission of the owner. 
4. Availability - System should be accessible as and when the users want it. (how would you study if bankexamstoday.com is down half the time)
5. Non Repudiation - The ability of receiver of information to prove that sender actually did send that message. 
6. Auditing - The ability to record events that might have some security relevance. Audit trail may allow undo operations to help restore the system to previous good state. 

Security Attacks

Any action that compromises the security of information is said to be a security attack. Below are discussed four types of attacks:
1. Interruption - attack on availability
Network Security
2. Interception - attack on confidentiality
Network Security
3. Modification - attack on integrity
Network Security
4. Fabrication - attack on authenticity
Network Security

Passive and Active Attacks

1. Passive Attack - It is said to occur when an unauthorized entity obtains information that is being transmitted (eavesdropping). It is comparatively difficult to detect. Passive attacks can be of two types: 
  • When the observer tries to know the content being transmitted.
  • When the observer tries to know the location, identity of users. 
2. Active Attack - It is said to occur when an unauthorized entity modifies the original data stream or creates a false one. It can be further divided into four categories:
a) Masquerade - In this attack, one entity pretends to be a different entity.
b) Replay - In this data is captured passively and transmitted subsequently to produce an authorized effect. 
c) Modification - In this, some portion of legitimate message is altered before it reached the intended recipient. 
d) Denial of Service - It prevents the normal use of communication facilities. DoS attacks can be done at application layer or network layer specifically. In application layer attack, an attempt is made to overload the server by sending a large number of fake requests resulting into its failure. In network layer attack, an attempt is made to clog the connecting architecture i.e routers, switches, E.g - SYN flooding.

Security Tools

1. Cryptography (symmetric and asymmetric)
2. Firewalls and Proxies (Ipchains, Iptables)
3. TCP wrappers and UDP relayers
4. Authentication Modules
5. Kernel level security in Linux
6. Log files (/var/log/*)
We'll start with cryptography from next article onwards. 

Quote of the day

If you want to shine like a sun, first burn like a sun.  - Late Shri A.P.J Abdul Kalam
                                                                                                                                     Deepak A
Join 40,000+ readers and get free notes in your email

This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.



Network Security - Overview 4.5 5 Yateendra sahu December 27, 2015 Hi Folks,  We'll start with overview of network security today, relevant components of this topic will be covered in upcoming articles....


Related Post:

  • IBPS CWE PO/MT-VII Interview Call Letter Released
    Dear Candidates, Here is a good news for all those who have cracked the Mains Examination of Institute of Banking Personnel Selection for the post of Probationary Officers/Management Trainees. The IBPS has released the Interview call letter. The e… Read More
  • BoBCards Assistant Manager(IT) Recruitment 2018
    Hi Readers, BOB Financial Solutions Limited (BFSL) (Formerly known as BOBCARDS Limited) has recently released the notification ofAssistant Manager (IT) - Mobility Developer post. Education Qualification:- B.E./B.Tech/MCA/Graduate… Read More
  • IBPS SO Result Out: Check Here
    Institute of Banking Personnel Selection (IBPS) has released the preliminary examination result for Specialist officer recruitment. Candidates who had appeared for the examination on 30-31 December 2017 can check their result using the link given … Read More
  • SSC CGL 2017 Tier I: Revised Marks Out
    Hi Readers, Staff Selection Commission(SSC) has recently revised the Marks of the Candidates of SSC CGL 2017 Tier I. You can check your Results from here. Click Here To Download Marks Details (Western Region). Click Here To D… Read More
  • IBPS Recruitment 2018 : Head Administration (On Contract)
    Dear Candidates, Institute of Banking Personnel Selection(IBPS) has released the notification for the recruitment of Head Administration(On Contract).The interested candidates can apply for the post till 31st January 2018(before 5pm). Total Pos… Read More
Load comments

No comments:

Post a Comment