NetworkSecurityConceptsDangersandDefendBestPractical-master
NetworkSecurityConceptsDangersandDefendBestPractical-master
net/publication/369739760
CITATIONS READS
30 10,034
1 author:
SEE PROFILE
All content following this page was uploaded by Oluwasanmi Richard Arogundade on 03 April 2023.
Abstract
In today's highly interconnected world, network security has become a critical aspect of protecting organizations
from cyber-attacks. The increasing sophistication of attackers and their ability to exploit software and firmware
vulnerabilities pose significant dangers to the security of networks. However, many organizations often neglect
the essential steps required to secure their networks, leading to an increased risk of security breaches. In this
research article, we aim to address this issue by investigating network security concepts, potential dangers, and
practical defense strategies. We begin by exploring the different types of cyber-attacks and their sources,
highlighting the various ways attackers exploit network vulnerabilities. We also examine the reasons why
organizations often overlook network security and the consequences of not prioritizing it. To better understand the
complexity of network security, we categorize the different security concerns using the CIA (confidentiality,
integrity, and availability) triangle. This approach allows us to identify the various areas of vulnerability and their
potential impact on network security. Next, we focus on the most crucial basic concepts and steps involved in
various network security operations. We outline the best practices and practical approaches organizations can take
to improve their network security, including implementing security policies and procedures, using encryption and
authentication methods, and conducting regular security assessments. By highlighting the importance of network
security and providing practical guidance on how organizations can defend against cyber-attacks, we hope to raise
awareness and help prevent security breaches.
Keywords: Network, Internet, Security, Security Threats, IP Address, Network Attack, Attackers
DOI: 10.7176/CEIS/14-2-03
Publication date:March 31st 2023
1. Introduction
Undoubtedly, the internet has become an integral part of our daily lives. It has revolutionized the way we live,
works, and communicate with each other. From online shopping to social media, the internet has made our lives
more convenient and connected than ever before. However, with the increasing use of technology comes the threat
of cyber-attacks and security breaches. As we rely more and more on technology, the risk of sensitive and
confidential data being compromised also increases. The internet is undoubtedly one of the greatest innovations in
human history, and its positive impact on society cannot be overstated. However, the downside of this innovation
is that it has also made it easier for malicious actors to exploit vulnerabilities in computer systems and networks
to steal data, cause financial harm, and disrupt business operations. Cybersecurity is therefore of utmost importance
to individuals, businesses, and organizations. In today's world, where cyber threats are becoming increasingly
sophisticated, it is critical to adopt excellent network security measures that can protect against potential attacks
and offer access only to those who need it.
Unfortunately, detecting and preventing data risks is not always straightforward, and failing to do so can
result in serious consequences, including financial losses and reputational damage. That is why network security
professionals play a critical role in preventing and understanding these hazards.
To achieve effective network security, businesses and organizations must consider multiple layers of control.
Protection, detection, and reaction are the three basic frameworks of network security that should underpin any
networking strategy. Protection involves configuring computer systems and networks to prevent attacks, while
detection involves monitoring the network to identify any suspicious activity that could indicate a potential attack.
Reaction entails implementing an effective response strategy to minimize the impact of a security breach and
restore the network to a safe state as quickly as possible. It is important to note that cyber threats are constantly
evolving and relying on a single line of defence is inadequate. Therefore, organizations need to stay proactive and
up to date with the latest security measures to protect against potential attacks.
while the internet has brought many benefits to our daily lives, it has also exposed us to significant risks.
Effective network security measures are therefore essential to safeguard sensitive data and prevent cyber attacks.
By adopting a comprehensive network security strategy that includes protection, detection, and reaction,
businesses and organizations can minimize the risk of security breaches and protect their reputation, finances, and
intellectual property.
Protection is the first line of defence in network security. It involves configuring computer systems and
networks correctly to protect against attacks. This includes securing access points, such as firewalls,
25
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
routers, and switches, using strong passwords, and regularly updating software and security patches.
Protection also involves implementing security policies and procedures, such as access controls,
encryption, and authentication protocols.
Detection: is the next layer of defence in network security. It involves having good insight into the
network and system, which gives you the ability to identify when your organization's network
configuration has changed or when some network traffic indicates a problem. Detecting threats early can
prevent attackers from causing significant damage, minimizing the impact on the network and the
organization. There are many tools available to aid in the detection process, such as intrusion detection
and prevention systems, log analysis, and network monitoring software.
Reaction: this is the final layer of defence in network security. It defines your response after identifying
problems and how quickly you can return to a safe state with minimum downtime. It involves having a
plan in place for responding to incidents, such as isolating affected systems, containing the threat, and
restoring the network to its previous state. Quick and effective reactions are critical to minimizing the
impact of an attack and reducing the risk of a repeat incident.
26
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
Active Attacks
27
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
attacker. These attacks can come in many forms, and they are not limited to credit card usage. Let's take an example
of an email conversation with the accounting department of an organization. Let's say Mary is the payroll clerk,
and she emails her supervisor Adam about moving some money between accounts and asks for the credential to
perform that task. Adam responds with the necessary credentials. Unfortunately, Tom, the hacker, in this case, has
captured their conversation. When the hacker resends the message to Adam later, it looks like a genuine message.
Tom, the hacker, has simply tricked Adam into parting with sensitive data, which now grants him access to the
account.
2.1.2.2. Alterations
In the alteration, the attacker intercepts messages and alters certain information to reroute the call, which involves
a change to the original message.
Using the same example, this time, when Tom intercepts the transaction, he then alters the amount to $400
before sending the request to Mary, and she will again transfer the required amount to the attacker without knowing.
If the modification or change is in the case of a web server or an operating system, that will bring threats of
disruption and usurpation to the system.
Passive Attacks
28
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
4.1. Malware
The term "malware" encompasses various types of attacks, including but not limited to spyware, Trojans, viruses,
ransomware, logic bombs, polymorphic viruses, and worms. Malware uses a vulnerability to breach a network
when a user clicks on a "planted" dangerous link or email attachment, which is used to install malicious software
inside the system, which the hacker uses to obtain information by retrieving data from the hard drive, disrupt the
system, or even render it inoperable.
4.2. Phishing
Phishing attacks are extremely common and involve sending mass amounts of fraudulent emails to unsuspecting
users, disguised as coming from a reliable and legitimate, source. When the user clicks on the email, it either
installs malicious scripts or files or extracts data such as user information, financial information, and more.
Phishing attacks come in various forms, including spear phishing, whaling, and pharming.
Spear phishing: Attackers use Phishing as a method to directly target specific individuals or organizations.
Whaling attacks: target only the senior executives of an organization.
Pharming attacks: attackers will redirect users who attempt to access a specific website to a fake version of the
website that looks identical to the original. It leverages the DNS cache to capture the end-user credentials.
29
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
The attacker's machine maintains communication with the server, and the server believes it is still in
contact with the client.
4.5. IP Spoofing
An attacker uses IP spoofing to convince a system it is dealing with a known, trusted entity, enabling the attacker
access to the system. Instead of using its own IP source address, the attacker sends a packet to a target host using
the IP source address of a known, trustworthy host. The target host will accept the packet and act on it.
4.9. Zero-day
Zero-day attackers jump at the disclosed vulnerability in a system or network where no solution/preventative
measures exist. The idea of "zero-day" is to exploit a network vulnerability before it is fixed. Our software, network,
or solution will often have some security vulnerabilities.
When vulnerabilities occur, software developers and vendors will work on a "patch" to fix that vulnerability,
but while this type of vulnerability is still open, the attacker takes advantage of it and launches their attack, and
this is called exploit code. The phrases vulnerability, exploit, and attack are frequently used interchangeably with
zero-day, and understanding the distinction is critical.
A "zero-day vulnerability" is when software has flaws or bugs in it, and attackers discover those flaws or
vulnerabilities before the vendor or developers know about them and create a patch. Because there is no
patch for that vulnerability, the attacks will likely succeed and gain access.
A "zero-day exploit" is a methodology used by the attacker to attack a network or system with a previously
unknown or unidentified vulnerability.
A "zero-day attack" occurs when an attacker uses a zero-day exploit to cause harm or steal data from a
vulnerable system.
30
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
4.12. Rootkits
Rootkits are typically transmitted via email attachments and unsecured website downloads. Once the attachments
or files are downloaded, the rootkit will gain access to the system by installing itself on your host, which is your
computer, server, etc. It can remotely change system configuration files on the server or host, Rootkits are
dangerous because they are designed to hide their presence on your host or devices without you knowing.
31
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
that is where the CIA triad comes into play, which is the basic principle of information security. Regarding network
security, one of the most essential models to govern information security policy inside an organization is the CIA
triad. (CIA) is the acronym for Confidentiality, Integrity, and Availability.
5.1 Confidentiality
Confidentiality is restricting information to those for whom it is intended. The term "confidentiality" refers to the
capacity of only authorized individuals or systems to read sensitive or classified information. Unauthorized
individuals or systems should not have access to network data. The essential strategy to avoid this is to use a VPN
tunnel (Virtual Private Network) to enable data transfer securely across the network, as well as encryption
standards such as AES (Advanced Encryption Standard) and DES (Data Encryption Standard) to safeguard your
data. such that even if the attacker gets access to your data, they will not be able to decrypt it.
5.2. Integrity
Integrity is ensuring that transmissions and messages aren’t corrupted or altered in purpose. Integrity refers to
protecting data from any form of modification by unauthorized users; it is the reliability of data throughout its
lifecycle while preserving both the external and internal consistency of the data. To maintain a state of data integrity
or accuracy, encryption methods can be used to achieve this. The mechanism of the encryption system should be
able to deter or indicate that the message has been corrupted or altered. Imagine the big problem it will cause if
someone's drug prescriptions or medical records are altered.
5.3. Availability:
Availability ensures information and services are accessible when needed. This implies that network users should
have easy access to the network when they need it. This is true for both systems and data; they need to be accessible
when it is required. To guarantee network and data availability, network and system administrators should maintain
regular updates for their hardware and software, and they should also have backup plans and fail-over strategies
for their organization's infrastructure, just in case of failure or DDoS attacks that take down the company's
infrastructure and resources. They can easily failover to other infrastructure, which will reduce the impact of such
a failure or attack.
Generally, all data that you wish to keep secure needs to remain confidential, maintain the integrity and be
available. confidentiality means simply keeping that a secret, meaning keeping it secret from those who are not
authorized to view it. Integrity refers to preventing unauthorized parties from changing the data or by accident,
and Availability means that information is available when you need it.
32
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
configure your servers and end-user workstations with a timed auto-logout so that no one can sit down at someone
else's workstation or laptop if that user forgets to log out.
33
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
judgment call. Like, how much money is this going to cost us if a server goes down because of an attack? How
much money are we going to lose? Obviously, the more money you are at risk of losing, the more effort you want
to put into catching, solving, or reducing that vulnerability or risk. If an organization's risk assessment report shows
a small or low-level risk that is unlikely to materialize or occur, your organization may choose to ignore it and
concentrate on situations with greater risk. But do not forget the laws and regulations that your organization is
subjected to. When an organization's risk assessment report shows that a particular risk has an estimated cost per
year of $20,000 and occurs maybe twice a year, and another particular risk costs $80,000 per year, depending on
how many times it occurs, a higher priority will be placed on the second risk. Qualitative measurements are a little
bit harder to judge because they're subjective. For example, a system may be critical to your back end, but it doesn't
produce any income. Maybe it manages all your internal accounts, like a directory server. If that server goes down,
what will happen? Well, employees can't access their accounts for some time. How much is your company actually
losing in profit, and how much are they actually losing in revenue-generating income with a delay in work?
Because we can't put a dollar sign on it, it's a little bit harder to judge.
A security policy should be written at a high level and be accessible to all staff members of your organization.
It should be comprehensive rather than technology specific. This ensures that the security policy will rarely require
updating, but based on the technology-specific security policy, procedures can be written, so it's assumed that as
time goes on, procedures will need to be rewritten but the security policy should not. Your acceptable use policy
(AUP) should be included in your policy. This policy indicates to end-users what they are allowed to do on the
network or servers and what they're not allowed to do. Maybe they are not allowed to use company email for
personal purposes, or maybe they are not allowed to install third-party software. In your security policy, ensure
you clearly define the roles and responsibilities of IT staff, end-users, and services. like who should be in charge
of maintaining the network infrastructure, database backups, renewing software licenses, overseeing data storage,
compliance, and other legal documents.
What should the person in charge of backup specifically be doing daily to ensure that the backup is done
properly, or what should the person in charge of the service-level agreement (SLA) be doing to ensure the company
is not paying unnecessary penalties? The security policy is easy to implement in the cloud, but my focus for this
article is on a physical data centre situation.
It is also crucial that you do a regular review and evaluation of your policy and procedure. your environment
will continue to change, as well as the compliance standards. I recommend that your company initiate a review
quarterly or annually. Usually, every new employee of an organization must sign the acceptable use policy when
they're being hired to indicate that they understand it and will abide by it.
34
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
then that user or service should not have such a right. This also helps limit the possible damage an unauthorized
user can cause by gaining access to a system or its resources. Access control may be at the application level or at
the level of the operating system. This helps us have granular control over what a particular application, system,
or account is allowed to do. For easy administration of users and accounts, you want to assign permissions to
groups of accounts or users rather than to individual accounts or users. You do this by creating groups of users or
services with similar roles or job functions and then assigning specific permissions to the group. And whatever
permissions these groups have, that is what each of those users can do.
One other area of security that most start-up organizations overlook is remote access permissions. The
network and system administrator can access a router, switch, system, or device through a console when they are
physically present at the data centre or server room, but when they are not present at the data centre and they need
to access servers, they will need remote access, which is only available by using an IP address. If proper security
measures are not in place, an unauthorized user or attacker can capture sensitive information and access our devices.
To ensure this is not the case, we need a framework called Triple (AAA ), to provide an extra level of security
for devices. Triple (AAA) is the acronym for authentication, authorization, and accountability. Authentication
means that a user is who they say they are; it is the way to identify the user before they can access the company's
network resources. This can be done using the local database of that device (router) or via an external server like
the ACS server.
For example, if an end-user with the name Mary logs in to a system or server as Mary and provides a password
that belongs to Mary, the system will authenticate her, but if she provides the wrong password, the system will not.
Authorization refers to the actions that the user can perform once they have been authenticated. It is used to
determine what resources the end-user is allowed to access and the type of operations they can perform on those
resources. Accountability means monitoring and capturing end-user activities on your company's network or
systems. It is a way of holding users accountable for their actions on the system or network. capturing actions
performed by users while accessing the network, server, or services. We can even monitor how long the user has
had access to the network or system by using logs and auditing.
Many organizations will allow users to have the same permissions no matter where they are physically located.
and this is not a secure practice; permission should be restricted based on location, sources, etc. Use a VPN if you
intend to let end-users access information or data on your network from a remote location; a VPN provides secure
communication over the public network. The way to understand VPN is by using an analogy. Two friends, Tom,
and Mary are traveling by car to a coffee shop; Mary is using a bulletproof car with a body guide, and Tom on the
other end is just driving a normal car without any bulletproof. The road to the coffee shop in this analogy is the
public internet, and the bulletproof car is the VPN. Tom and Mary represent the data that goes back and forth
between your network and the public network.
This data will be encrypted using a VPN. We will discuss more on the concepts of VPNs when we start
talking about securing data in transit.
35
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
HTTPS, and port 80 or 443 needs to be opened. For you to access a Linux server via SSH, port 22 needs to be
opened. If the server or service is not listening to a specific port when a remote client tries to connect to it, the
connection will fail. The principle of least privilege applies here; you only open ports for necessary services.
You also want to remove any servers and disable any services that are not in use from your network. meaning you
should completely unplug those servers or devices. Port numbers are used to distinguish between different services
that run over transport protocols such as TCP and UDP. Here are some common and well-known ports:
Table 1. Table of Common Network Protocols, Port Numbers, and Functions
Protocol Port Number Function
HTTPS 443 Secure version of HTTP for secure web browsing and data transfer
HTTP 80 Protocol for web browsing and data transfer
SMTP 25 Simple Mail Transfer Protocol for sending email messages
POP3 110 Post Office Protocol for retrieving email messages from a server
FTP 20 and 21 File Transfer Protocol for transferring files between computers
SSH 22 Secure Shell protocol for secure remote access to servers
NetBIOS 137, 138, 139 Networking protocol for communication between devices in a LAN
Telnet 23 Protocol for remote access to devices like servers, routers, and switches
DNS 53 Domain Name System for translating domain names into IP addresses
TFTP 69 Trivial File Transfer Protocol for simple file transfer over a network
36
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
installed and the latest signatures. You can schedule signature updates to occur outside business hours. You have
the option of manually updating the signature or configuring the antivirus protection based on minimum criteria;
if the workstation does not meet the minimum criteria, that workstation is quarantined from the network until it is
upgraded to meet the minimum criteria.
37
Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.14, No.2, 2023
7.0 Conclusion
At this point, I want to remind you that there is nothing like total security, so continuous monitoring of your
network is crucial and the key to staying secure. Ensure you apply the concept of "security defense in depth,"
having multiple layers of security for your infrastructure. The main idea here is that different security tools should
be applied at each layer of your infrastructure. and every component of your security plan should have backups to
combat failures and breaches. If one layer of security fails, the other layer of security will protect your
infrastructure and resources. For example, if an intruder succeeds in breaking into the data centre, they will still
need to determine the username and password of the server, and if the login also has 2-way authentication, then
the intruder will have to break that as well. And if the data is also encrypted at rest, they must also break that
encryption to access our data. Cyber-attacks are increasing on daily basis, so you want to ensure you are applying
security patches when they are due and anti-virus signatures are up to date, train your employees about security,
and ensure your organization is up to date with compliances. Configure your network firewall to allow only the
required ports and hosts; use secure and strong passwords, and do not forget to use the principle of the least-
privilege model in your IT infrastructure. perform frequent backups and a continual audit of your IT environment.
References
Achar, S. (2022). Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our
Modern Threat Landscape. CERN European Organization for Nuclear Research - Zenodo.
https://doi.org/10.5281/zenodo.7084251
Average cost per data breach in the United States 2006-2022. (2022, Sep 4). statista.com. Retrieved from
https://www.statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/
Academic Lesson (2019, Aug 2). Cybersecurity for beginners | Network Security Practical Course. Retrieved from
https://www.youtube.com/watch?v=qvDg17PbSnUu?.
Beňo, P. (2022). REMLABNET – BaaS, Backup as a Service in Remote Laboratories and Increase Sciences and
Research’s Data Security Precautions against Ransomware. International Scientific Days 2022: Efficient
Sustainable and Resilient Agriculture and Food Systems – the Interface of Science Politics and Practice.
Proceedings of Reviewed Articles of International Scientific Conference.
https://doi.org/10.15414/isd2022.s5-2.02
Bulgurcu, B., Cavusoglu, H., Benbasat, I. (2010). Information security policy compliance: an empirical study of
rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-548.
Choudary .A.(2022, Nov 15). What is Network Security: An introduction to Network Security. Retrieved from
edureka.co. https://www.edureka.co/blog/what-is-network-security/
CIA Triad and New Emerging Technologies: Big Data and IoT. (2015, Oct 13). informationsecuritybuzz.com.
Retrieved from https://informationsecuritybuzz.com/isbuzz-expert-panel/cia-triad-and-new-emerging-
technologies-big-data-and-iot/
Harrington, J. L. (2005). Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking).
Morgan Kaufmann.
Kizza, J. M. (2017). Guide to Computer Network Security. Springer.
Madushan Jayasekara, Chamoth,(2022). Network Security: Case Study Analysis Available at
SSRN: https://ssrn.com/abstract=4217769 or http://dx.doi.org/10.2139/ssrn.4217769
Marin, G. (2005). Network Security Basics. IEEE Security and Privacy Magazine, 3(6), 68–72.
https://doi.org/10.1109/msp.2005.153
Nair, Anita (2021): The Why and How of adopting Zero Trust Model in Organizations. TechRxiv. Preprint.
https://doi.org/10.36227/techrxiv.14184671.v1
Nieles, M., Dempsey, K., Pillitteri, V. (2017). An Introduction to Information Security. NIST Special Publication
800-12 Revision 1. Retrieved May 12, 2020 from
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf
Pappalardo, D., & Messmer, E. (2005). Extortion via DDoS on the rise. Network World.
Raimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the Internet of Things in Industrial
Management. Applied Sciences, 12(3), 1598. https://doi.org/10.3390/app12031598
Sadhu, P. K., Yanambaka, V. P., & Abdelgawad, A. (2022). Internet of Things: Security and Solutions
Survey. Sensors, 22(19), 7433. https://doi.org/10.3390/s22197433
Talking security: the basics. (1999-2022.). Open Learn. Retrieved from
https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=104794§ion=1.1
What are Web Application Vulnerabilities? (n.d.). rapid7.com. Retrieved from
https://www.rapid7.com/fundamentals/web-application-vulnerabilities
What is a Cyber Attack? (2021) secureterminus.com. Retrieved from https://secureterminus.com/cyber-attacks.
38