0% found this document useful (0 votes)
17 views

Network Security Basics Report

This document provides an overview of network security, highlighting various threats such as malware, phishing, and DoS attacks, along with basic security measures to protect against them. It emphasizes the importance of monitoring network traffic and implementing best practices, including the use of firewalls, VPNs, and user education. The conclusion reinforces the necessity of continuous learning and awareness to combat evolving cyber threats.

Uploaded by

PradeepKumar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Network Security Basics Report

This document provides an overview of network security, highlighting various threats such as malware, phishing, and DoS attacks, along with basic security measures to protect against them. It emphasizes the importance of monitoring network traffic and implementing best practices, including the use of firewalls, VPNs, and user education. The conclusion reinforces the necessity of continuous learning and awareness to combat evolving cyber threats.

Uploaded by

PradeepKumar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Network Security Basics

1. Introduction
Network security is the practice of protecting network infrastructure, devices, and data from
unauthorized access, cyber threats, and potential attacks. With the increasing reliance on
digital communication and data transfer, securing networks has become a crucial aspect of
cybersecurity. This report explores different network threats, basic security measures, traffic
monitoring techniques, and best practices for a secure network.

2. Network Threats
A network is vulnerable to various threats, including malware, unauthorized access, and
social engineering attacks. Below are some common network threats and their impacts:

a) Viruses

A virus is a type of malicious software (malware) that attaches itself to a legitimate file or
program. It spreads when the infected file is executed, often corrupting data or damaging
system functionality.

Example:

 A virus-infected email attachment can spread across a company’s network, corrupting


critical files.

b) Worms

Unlike viruses, worms do not require user interaction to spread. They replicate themselves
and exploit network vulnerabilities to infect multiple systems.

Example:

 The WannaCry ransomware worm (2017) spread rapidly by exploiting a Windows


vulnerability, causing significant global damage.

c) Trojans

Trojans disguise themselves as legitimate software but contain malicious code that grants
unauthorized access to attackers.

Example:

 A fake antivirus program claiming to remove malware but actually stealing user
credentials.
d) Phishing

Phishing attacks deceive users into providing sensitive information, such as usernames and
passwords, through fake emails or websites.

Example:

 An email pretending to be from a bank, prompting users to enter their account details
on a fraudulent website.

e) Man-in-the-Middle (MITM) Attacks

In a MITM attack, an attacker intercepts and manipulates communication between two


parties.

Example:

 An attacker on a public Wi-Fi network intercepting a user’s online banking


credentials.

f) Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

These attacks overwhelm a network or website with excessive traffic, causing service
disruptions.

Example:

 A botnet attack floods a website with millions of fake requests, making it unavailable
to real users.

3. Implementing Basic Security Measures


a) Setting Up a Secure Network Environment

 Configured a secure home Wi-Fi network with a router and multiple connected
devices.
 Ensured that all devices had updated security patches and operating systems.

b) Configuring a Firewall

 Enabled Windows Defender Firewall to filter network traffic and block unauthorized
access.
 Created custom firewall rules to allow only essential services and applications.

c) Strengthening Network Security


 Changing Default Credentials: Replaced the default router username and password
to prevent unauthorized access.
 Enabling WPA3 Encryption: Ensured secure wireless communication using WPA3
encryption.
 Disabling Remote Management: Prevented external access to router settings.

4. Monitoring Network Traffic with Wireshark


a) Capturing Network Traffic

Wireshark was used to capture and analyze live network traffic, helping to understand data
flow and detect anomalies.

b) Identifying Common Traffic Types

 HTTP Traffic: Unencrypted web browsing data, including requests and responses.
 DNS Traffic: Resolves domain names to IP addresses, essential for internet
browsing.
 Encrypted Traffic (TLS/SSL): Secure communication protocols for websites
(HTTPS).

c) Detecting Unusual Activity

 Observed excessive requests to unknown IP addresses, which could indicate malware


infection.
 Detected failed login attempts from unauthorized IP addresses.

5. Security Best Practices and Recommendations


a) Additional Security Measures for Larger Networks

 Intrusion Detection and Prevention Systems (IDS/IPS): Monitors network traffic


for suspicious activity.
 Virtual Private Networks (VPNs): Encrypts internet traffic for secure remote
access.
 Network Segmentation: Divides a network into isolated sections to limit the spread
of threats.
 Regular Security Audits: Periodically check for vulnerabilities and apply necessary
updates.

b) Educating Users on Network Security

To promote network security awareness:


 Avoid clicking on unknown links or attachments.
 Use strong, unique passwords and enable multi-factor authentication (MFA).
 Recognize phishing emails by verifying sender information.
 Avoid using public Wi-Fi for sensitive transactions.
 Regularly update software and antivirus programs.

6. Conclusion
Network security is a fundamental aspect of protecting digital infrastructure. Understanding
threats like viruses, worms, and phishing attacks, and implementing basic security measures
like firewalls and encryption, significantly reduce risks. By monitoring network traffic and
following best security practices, users can safeguard their personal and professional data
against cyber threats. Continuous learning and awareness are key to staying ahead of
evolving security challenges.

7. References
 Wireshark User Guide
 Microsoft Security Documentation
 National Institute of Standards and Technology (NIST) Cybersecurity Framework

You might also like