HOST-BASED AND
NETWORK BASED
SECURITY ISSUES
WHAT IS HOST-BASED SECURITY?
• Security measures implemented on individual
devices.like computers and servers.
• This security approach addresses vulnerabilities
within the operating system, applications, and data
stored on the host itself.
• Examples: Antivirus, EDR, host firewalls.
• Goal: Prevent threats from affecting the local system.
HOST BASED SECURITY ISSUES
• Inadequate Logging and Monitoring: Failure to monitor and log
host activities can result in missed security incidents and breaches.
• Malware and Ransomware: Malicious software can infect the
hostsystem, potentially leading to data theft, data encryption (in the
case of ransomware), or other forms of damage.
• Weak Passwords: Weak and easily guessable passwords for
database accounts and host system accounts can be exploited by
attackers.
• Unsecured Backup and Storage: Backups stored on the host system or
network without proper encryption or access controls can become targets for
attackers.
• Misconfigured Services: Misconfigurations of host services or firewall rules
can expose the database server to threats from the internal or external
network.
• Lack of Intrusion Detection: Without intrusion detection systems on the
host, it may be difficult to detect and respond to security breaches promptly.
• Physical Security: Insufficient physical security measures can lead to
unauthorized access to the host system, potentially compromising the
database.
WHAT IS NETWORK-BASED SECURITY?
• Protects data as it travels across networks.Network-based security
focuses on safeguarding a computer network's infrastructure, data,
and applications from unauthorized access, misuse, or attacks.
• Network-based security issues encompass a wide range of
vulnerabilities and threats that can compromise the integrity,
confidentiality, and availability of network resources and data.
• Examples: Firewalls, IDS/IPS,VPNs.
• Goal: Monitor and defend data in transit.
NETWORK BASED SECURITY ISSUES
• Unauthorized Access: Attackers may attempt to gain unauthorized access to
the database by exploiting vulnerabilities in network services or through
techniques like password cracking or brute force attacks.
• Eavesdropping: Attackers can intercept and monitor network traffic to capture
sensitive data, such as login credentials or data being transmitted between the
database and client applications.
• Data Interception: Man-in-the-middle (MitM) attacks can intercept and modify
data packets in transit, potentially leading to data manipulation or leakage.
• Denial of Service (DoS) Attacks: Attackers can flood the
network with traffic or exploit vulnerabilities in network services
to disrupt database availability, causing downtime.
• Database Vulnerabilities: If the database server is directly
exposed to the internet or not properly secured within the
network, it becomes vulnerable to various attacks, including SQL
injection, cross-site scripting (XSS), and buffer overflows
DEFENSE STRATEGIES
• Combine host and network security tools.
• Regular system updates and patching.
• Enforce access control policies.
• Monitor systems and networks continuously.
• Educate users on security best practices.
Aspect Host- based security Network based security
Definitio Security measures implemented directly on Security measures applied to
n individual devices (hosts). monitor and protect network
traffic.
Focus Protects individual systems like servers, Protects data in transit across the
workstations, laptops. network.
Examples Antivirus, host-based firewalls, endpoint Network firewalls, intrusion
detection and response (EDR), OS patches. detection systems (NIDS), VPNs.
Visibility Limited to the local host (what happens on Monitors traffic between systems
that machine). across the network.
Control User-level or admin-level control on Admin-level control over traffic
specific machines. across the network.
Deploym Applied to each device individually. Centralized and applies to all
ent scope devices connected to the
network.