computers linked together by a single cable.
Without a network, we can access resources only on our own computer.
These resources may be devices in our computer, such as a folder or disk
drive, or they may be connected to our computer, such as a printer or CDROM
drive. These devices, accessible only to us, are local resources. Networking allows us to share resources among a group of computer users.
In the field of networking, the specialist area of network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.

Security & Security Attacks
Security is a state of well-being of information and infrastructures in which the possibility of successful yet un-detected theft, tamper-with, and disruption of information and services is kept low. A security attack is any action that threatens this state of well-being
Consequence of Attacks
- Theft of confidential information
- Unauthorized use of network bandwidth computing resource
- Spread of false information
- Disruption of legitimate services
- All attacks are related and dangerous!
- Attack channel - network-borne!
- Attack targets - network management/control information:
- Steal of service
- Steal of user data
- Injection of disrupting data/control packets
- Interception and modification of data/control packets
- Compromising network entities, routers & switches
What's the Biggest Security Problem?
Experts, hackers debate cyberterror, digital teens, and holey software.
-Andrew Brandt, PCWorld.com-
-Apr 16, 2003 8:00 am-
Security Problems, Threats and Risks
Experts, hackers debate cyberterror, digital teens, and holey software.
-Andrew Brandt, PCWorld.com-
-Apr 16, 2003 8:00 am-
Security Problems, Threats and Risks
Client-side Vulnerabilities in:
- Web Browsers
- Office Software
- Email Clients
- Media Players
Server-side Vulnerabilities in:
- Web Applications
- Windows Services
- Unix and Mac OS Services
- Backup Software
- Anti-virus Software
- Management Servers
- Database Software
Security Policy and Personnel:
- Excessive User Rights and Unauthorized Devices
- Phishing/Spear Phishing
- Unencrypted Laptops and Removable Media
Application Abuse:
- Instant Messaging
- Peer-to-Peer Programs
Network Devices:
- VoIP Servers and Phones
Zero Day Attacks:
- Zero Day Attacks


0 comments:
Post a Comment