Unit 4 CN: Network Security
Unit 4 CN: Network Security
Network Security
Network Security refers to the measures taken by any enterprise or
organization to secure its computer network and data using both hardware
and software systems. This aims at securing the confidentiality and
accessibility of the data and network. Every company or organization that
handles a large amount of data, has a degree of solutions against many cyber
threats.
The most basic example of Network Security is password protection which
the user of the network oneself chooses. In recent times, Network Security
has become the central topic of cyber security with many organizations
inviting applications from people who have skills in this area. The network
security solutions protect various vulnerabilities of the computer systems
such as:
1. Users
2. Locations
3. Data
4. Devices
5. Applications
Benefits of Network Security
Network Security has several benefits, some of which are mentioned below:
1. Network Security helps in protecting clients’ information and data
which ensures reliable access and helps in protecting the data from
cyber threats.
2. Network Security protects the organization from heavy losses that
may have occurred from data loss or any security incident.
3. It overall protects the reputation of the organization as it protects
the data and confidential items.
Working on Network Security
The basic principle of network security is protecting huge stored data and
networks in layers that ensure the bedding of rules and regulations that have
to be acknowledged before performing any activity on the data.
These levels are:
1. Physical Network Security
2. Technical Network Security
3. Administrative Network Security
These are explained below:
1. Physical Network Security: This is the most basic level that includes
protecting the data and network through unauthorized personnel from
acquiring control over the confidentiality of the network. These include
external peripherals and routers that might be used for cable connections.
The same can be achieved by using devices like biometric systems.
2. Technical Network Security: It primarily focuses on protecting the data
stored in the network or data involved in transitions through the network.
This type serves two purposes. One is protected from unauthorized users,
and the other is protected from malicious activities.
3. Administrative Network Security: This level of network security protects
user behavior like how the permission has been granted and how the
authorization process takes place. This also ensures the level of
sophistication the network might need for protecting it through all the
attacks. This level also suggests necessary amendments that have to be done
to the infrastructure.
Types of Network Security
The few types of network securities are discussed below:
1. Access Control
2. Antivirus and Anti-Malware Software
3. Cloud Security
4. Email Security
5. Firewalls
6. Application Security
7. Intrusion Prevention System(IPS)
1. Access Control: Not every person should have a complete allowance for
the accessibility to the network or its data. One way to examine this is by
going through each personnel’s details. This is done through Network Access
Control which ensures that only a handful of authorized personnel must be
able to work with the allowed amount of resources.
2. Antivirus and Anti-malware Software: This type of network security
ensures that any malicious software does not enter the network and
jeopardize the security of the data. Malicious software like Viruses, Trojans,
and Worms is handled by the same. This ensures that not only the entry of
the malware is protected but also that the system is well-equipped to fight
once it has entered.
3. Cloud Security: Now a day, a lot of many organizations are joining hands
with cloud technology where a large amount of important data is stored over
the internet. This is very vulnerable to the malpractices that few unauthorized
dealers might pertain to. This data must be protected and it should be
ensured that this protection is not jeopardized by anything. Many businesses
embrace SaaS applications for providing some of their employees the
allowance of accessing the data stored in the cloud. This type of security
ensures creating gaps in the visibility of the data.
4. Email Security: Email Security depicts the services, and products designed
to protect the Email Account and its contents safe from external threats. For
Example, you generally see, fraud emails are automatically sent to the Spam
folder. because most email service providers have built-in features to protect
the content.
5. Firewalls: A firewall is a network security device, either hardware or
software-based, which monitors all incoming and outgoing traffic and based
on a defined set of security rules accepts, rejects, or drops that specific traffic.
Before Firewalls, network security was performed by Access Control Lists
(ACLs) residing on routers.
Traditional cryptography
Traditional cryptography refers to the early methods of encrypting information to
protect it from unauthorized access or interpretation. These methods, while less
sophisticated than modern cryptographic techniques, played a crucial role in
safeguarding communication and information security throughout history. Two
fundamental types of traditional ciphers are substitution ciphers and transposition
ciphers.
❖ Substitution Ciphers
Substitution ciphers, also known as substitution encryption, replace characters in the
plaintext with different characters according to a predetermined rule or substitution
table. This technique alters the appearance of the message, making it difficult for
unauthorized individuals to decipher.
• Types of Substitution Ciphers
1. Monoalphabetic Substitution: In monoalphabetic substitution, each plaintext
character is replaced with a corresponding ciphertext character using a fixed
substitution table. A well-known example is the Caesar cipher, where each
letter is shifted a certain number of positions in the alphabet.
2. Polyalphabetic Substitution: Polyalphabetic substitution employs multiple
substitution tables or alphabets to encrypt the plaintext. This method makes it
more difficult to decipher, as the substitution pattern changes throughout the
message. Examples include the Vigenère cipher and the Playfair cipher.
❖ Transposition Ciphers
Transposition ciphers, also known as transposition encryption, rearrange the order of
characters in the plaintext without changing the characters themselves. This
technique alters the sequence of the message, making it difficult for unauthorized
individuals to read.
Cryptographic Principles
Cryptographic principles are the fundamental concepts and techniques that are
used in the field of cryptography to secure communication and protect data.
These principles include confidentiality, integrity, authentication, non-
repudiation, and key management.
There are several fundamental principles that are important in the field of
cryptography, including −
❖ DES Operation
DES encryption works as follows:
1. The plaintext block is divided into two halves, each of 32 bits.
2. The first half of the plaintext block is passed through a series of 16 rounds of
encryption.
3. In each round, the plaintext block is combined with a subkey, which is
generated from the key using a key schedule.
4. The output of the 16th round is combined with the second half of the plaintext
block.
5. The resulting block is the ciphertext.
The subkeys are generated from the key using a key schedule. The key schedule is
a deterministic algorithm that generates 16 subkeys from the original key. This
ensures that the same plaintext will always encrypt to the same ciphertext,
regardless of the order in which the rounds are performed.
DES Security
The security of DES depends on the length of the key. The 56-bit key is relatively
short, and has been shown to be vulnerable to brute-force attacks. A brute-force
attack is an attack that tries every possible key until the correct key is found.
In 1998, a team of researchers from the Electronic Frontier Foundation (EFF) used a
custom-built computer to crack a DES-encrypted message in 22 hours. This
demonstrated that DES is no longer considered secure for most applications.
• DES Applications
DES was used in a variety of applications, including:
− Data encryption: DES was used to encrypt data stored on hard drives,
removable media, and network devices.
− Network security: DES was used to encrypt data transmitted over networks,
such as the Internet and private networks.
− File encryption: DES was used to encrypt files, such as documents, images,
and software.
• DES Replacement
DES has been superseded by more secure block ciphers, such as the Advanced
Encryption Standard (AES). AES is a 128-bit block cipher that is considered to be
much more secure than DES.