Security in Network

Thursday, October 29, 2009



A computer network is simply two or more computers connected together so
they can exchange information. A small network can be as simple as two
computers linked together by a single cable.

Without a network, we can access resources only on our own computer.
These resources may be devices in our computer, such as a folder or disk
drive, or they may be connected to our computer, such as a printer or CDROM
drive. These devices, accessible only to us, are local resources. Networking allows us to share resources among a group of computer users.

Types of network topology


In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.



Security & Security Attacks


Security is a state of well-being of information and infrastructures in which the possibility of successful yet un-detected theft, tamper-with, and disruption of information and services is kept low. A security attack is any action that threatens this state of well-being

Consequence of Attacks
  • Theft of confidential information
  • Unauthorized use of network bandwidth computing resource
  • Spread of false information
  • Disruption of legitimate services
  • All attacks are related and dangerous!
Network Specific Security Issues
  • Attack channel - network-borne!
  • Attack targets - network management/control information:
  1. Steal of service
  2. Steal of user data
  3. Injection of disrupting data/control packets
  4. Interception and modification of data/control packets
  5. Compromising network entities, routers & switches

What's the Biggest Security Problem?

Experts, hackers debate cyberterror, digital teens, and holey software.

-Andrew Brandt, PCWorld.com-
-Apr 16, 2003 8:00 am-


Security Problems, Threats and Risks

Client-side Vulnerabilities in:
  • Web Browsers
  • Office Software
  • Email Clients
  • Media Players
Server-side Vulnerabilities in:
  • Web Applications
  • Windows Services
  • Unix and Mac OS Services
  • Backup Software
  • Anti-virus Software
  • Management Servers
  • Database Software
Security Policy and Personnel:
  • Excessive User Rights and Unauthorized Devices
  • Phishing/Spear Phishing
  • Unencrypted Laptops and Removable Media
Application Abuse:
  • Instant Messaging
  • Peer-to-Peer Programs
Network Devices:
  • VoIP Servers and Phones
Zero Day Attacks:
  • Zero Day Attacks

0 comments:

Post a Comment