0% found this document useful (0 votes)
39 views

Network Security

1. The document discusses various topics related to network security including types of network security like firewalls and intrusion prevention systems. It also discusses network architecture, topologies, internet vs intranet, data flow in networks, and the roles of servers, clients, and workstations. 2. Common network architectures include client-server, peer-to-peer, and distributed architectures. Common network topologies are bus, star, ring, mesh, and tree. These determine how devices are interconnected and how data flows in a network. 3. An intranet is a private network contained within an enterprise while the internet is an interconnection of networks on a global scale. Data flow in networks can be simplex

Uploaded by

king.harlemchu
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Network Security

1. The document discusses various topics related to network security including types of network security like firewalls and intrusion prevention systems. It also discusses network architecture, topologies, internet vs intranet, data flow in networks, and the roles of servers, clients, and workstations. 2. Common network architectures include client-server, peer-to-peer, and distributed architectures. Common network topologies are bus, star, ring, mesh, and tree. These determine how devices are interconnected and how data flows in a network. 3. An intranet is a private network contained within an enterprise while the internet is an interconnection of networks on a global scale. Data flow in networks can be simplex

Uploaded by

king.harlemchu
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

NETWORK SECURITY

REPORTERS :
 ROMELYN LINGO
 CRIS IVAN C. ALINTOSON
 ATRIO ALAMEDA
WHAT IS NETWORK SECURITY

•Network security consists of policies and practices adopted to prevent


monitor from unauthorized access, misuse, modification, denial of a
computer network and network accessible resources.

It involves the authorization of access to data in a network, which can be


modified by the network administrator. There are three main aspects of
the network security prevention, protection, and security. Ultimately the
overall goal of the network security is to create a connected network that
protect against illegal activity while allowing you to perform activities you
need to.
This are some several different types of network
security:

•Firewalls
•Access control
•Virtual private networks (VPNs)
•Intrusion prevention systems
•Wireless security
•Application security
•Behavioral analytics
Network architecture and topologies

Network architecture and topologies are fundamental concepts in the


design and organization of computer networks. They determine how
devices are interconnected, how data flows, and the overall structure
of a network. Let's explore network architecture and topologies in
more detail:

•Network Architecture:
Network architecture refers to the design and layout of a network,
including its components and how they are interconnected. Several
common network architectures are used in modern networks:
INTERNET AND INTRANET

•Intranet: An intranet is a private network that is contained within an


enterprise. It may consist of many interlinked local area networks and also
use leased lines in the wide area network. It is a private version of the
Internet.

•Internet: Interconnection of Networks: Internetwork is a world wide


system of computer networks - a network of networks in which users at
any one computer can, if they have permission, get information from any
other computer (and sometimes talk directly to users at other computers).
DATA FLOW
•Communication between two devices can be Simplex, Half-Duplex, or Full-Duplex:

 Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of
the two devices on a link can transmit; the other can only receive. For example, Keyboards.

 Half-Duplex
With half-duplex, communications happen in both directions, but in only one direction at
a time. When two computers communicate using half-duplex, one computer sends a signal
and the other receives; then, at some point, they switch sending and receiving roles. For
example, push-to-talk technology (walkie-talkie).

 Full-duplex
Full-duplex allows communication in both directions simultaneously. Both stations can send
and receive signals at the same time. Full-duplex communications are similar to a telephone
call, in which both people can talk simultaneously.
DATA FLOW (Cont)
Server, Workstation, and Client role in networking

Server
A core component of the network, It provides resources to the clients on the
network (―serves‖ them, in other words). Servers are typically powerful
computers that run the software that controls and maintains the network. This
software is known as the network operating system.

Client
A client is any network entity that can request resources from the network.
Client computers also depends primarily on the central server for processing
activities.
Server, Workstation, and Client role in networking

• Workstation
Normally refers to
any computer that is
connected to the
network and used by
an individual to do
work
1. Client-Server Architecture: In this architecture, devices on the network are divided into
clients (end-user devices) and servers (centralized systems that provide services or resources).
Clients request services or data from servers, and servers respond to these requests. This
architecture is commonly used in business environments and the internet.
Advantages of a client-server Network
• Provides of better security.
• Easier to administer when the network is large because administration is
centralized.
• All date can be backed up on one central location.

Disadvantage of a Client-server Network


• Requires expensive, specialized network administrative and operational software.
• Requires a professional administrator.
• Has a single point of failure. User data is unavailable if the server is down
• Requires more expensive, more powerful hardware for the server machine
2. Peer-to-Peer (P2P) Architecture: In a P2P network, all devices can act as
both clients and servers. They can share resources and services directly with one
another without relying on centralized servers. P2P networks are often seen in
file-sharing applications.
Advantages of a Peer-to-Peer Network
• Less Expensive to implementation
• Does not require additional specialized network administration softwares
• Does not require a dedicated network administrator

Disadvantages of a Peer-to-Peer Network


• Does not scale well to large network and administration become unmanageable.
• Less Secure
• All machine sharing the resources negatively impact the performance.
3. Distributed Architecture: Distributed architecture involves spreading network
resources and services across multiple locations or data centers. This architecture
enhances redundancy and fault tolerance and is common in large-scale applications and
cloud computing.
What is Topology?

•Topology – physical and logical network layout of the network.

Common network topologies include:


•Physical – actual layout of the computer cables and other network devices.
•Logical – the way in which the network appears to the devices that use it.

•Network topologies are categorized into the following basic types:


•*BUS *STAR *RING *TREE *MESH
1. Bus Topology:
• A bus topology is a type of network setup where each
computer and network devices are connected to a single
cable or backbone
• A bus topology is multipoint
Advantages of Bus Topology
• Easy to connect a computer or peripheral to a linear
bus
• Requires less cable length than a star topology
• It works well for small networks.
Disadvantages of Bus Topology
• Entire network shuts down if there is a break in the
main cable
• Difficult to identify the problem if the entire network
shuts down
• Not meant to be used as a stand-alone solution in a
large building
2. Star Topology:
• All the components of network are
connected to the central device called
“hub” which may be a hub a router or
a switch.
• There are no direct traffic between
devices.
• The switch is the server and the
peripherals are the clients.
• The star topology reduces the
damage caused by line failure by
connecting all of the systems to a
central node.
Advantages of Star Topology
• Better performance.
• Easy to connect new nodes or devices.
• Failure of one node or link doesn’t affect the rest of
network..
• Easy to detect the failure and troubleshoot it.
Disadvantages of Star Topology
• Too much dependency on central device has its own
drawbacks.
• If hub fails whole network goes down.
• The use of hub, a router or a switch as central device
increases the overall cost of the network.
3. Ring Topology
• Ring Topology Devices are
connected to each other in a
circular shape.
• Each packet is sent around the
ring until it reaches its final
destination.
• Data travel from node to node,
with each node along the way
handling every packet.
Advantages of Ring Topology
• Ring Topology is very organized.
• Each node gets to send the data when it receives an empty
token.
• This helps to reduces chances of collision.
• All the traffic flows in only one direction at very high speed.
Disadvantages of Ring Topology
• One broken workstation can create problems for the entire
network.
• Moving, adding and changing the devices can affect the
network.
• Bandwidth is shared on all links between devices.
4. MESH TOPOLOGY
• A mesh network is a
network topology in which
each node (called a mesh
node) relays data for the
network.
• All nodes cooperate in the
distribution of data in the
network.
• A mesh network can be
designed using a flooding
technique or a routing
technique.
Advantages of Mesh Topology
• If one of the components fails there is always an alternative
present.
• Data transfer doesn’t get affected.
• Expansion and modification in topology can be done without
disrupting other nodes.
Disadvantages of Mesh Topology
• There are high chances of redundancy in many of the network
connections.
• Overall cost of this network is way too high as compared to other
network topologies
• Set-up and maintenance of this topology is very difficult.
5. Tree Topology
•Tree Topology integrates the
characteristics of Star and Bus
topology.
•The number of Star networks
are connected using Bus.
•Main cable seems like a main
stem of a tree, and other star
networks as the branches.
•Ethernet protocol is commonly
used in this type of topology.
Advantages of Tree Topology
• Expansion of Network is possible and easy.

• Error detection and correction is easy.

• Each segment is provided with dedicated point-to-point wiring to the central hub.

• If one segment is damaged, other segments are not affected.

Disadvantages of Tree Topology


• Because of its basic structure, tree topology, relies heavily on the main bus cable, if it
breaks whole network is crippled.

• As more and more nodes and segments are added, the maintenance becomes difficult.

• Scalability of the network depends on the type of cable .


Conclusion:
Understanding the different topologies and networks
available will allow any business or individual to
determine the network that will best suit the business
or individual needs and will help to establish the correct
expectations.
Knowing what budget constraints exist for the business
or individual as well as what the physical constraints of
where the network is to be located will help the
stakeholders make the correct decisions on which
topology and network would be most beneficial to
them.
Common Network Attacks:
EAVESDROPPING, SPOOFING,
DDOS
What is Network Attack?
• A network attack is an attempt to gain unauthorized
access to an organization’s network, with the objective
of stealing data or perform other malicious activity.
• A network attack refers to any deliberate and malicious
attempt to compromise the security, availability, or
integrity of a computer network or the devices
connected to it.
• Network attacks can take various forms and target
different layers of the network.
There are two main types of network attacks:
• Passive: Attackers gain access to a network and can
monitor or steal sensitive information, but without
making any change to the data, leaving it intact.
• Active: Attackers not only gain unauthorized access
but also modify data, either deleting, encrypting or
otherwise harming it.
Here some example of Common Network Attack
• Unauthorized Access: refers
to attackers accessing a
network without receiving
permission. Among the
causes of unauthorized
access attacks are weak
passwords, lacking
protection against social
engineering, previously
compromised accounts, and
insider threats.
Another example of Common Network
Attacks
• Eavesdropping: Eavesdropping is a network attack
where an unauthorized party intercepts and listens to
communication between two or more parties without
their knowledge or consent. This type of attack is a
violation of privacy and security, and it can have
serious consequences, especially in the context of
sensitive or confidential information.
One example of example of Eavesdropping Attack is
Man In The Middle Attack (MITM) :
• (MiTM) attack is a type
of cyber attack in which
the attacker secretly
intercepts and relays
messages between two
parties who believe they
are communicating
directly with each other.
Cyber Criminals conduct Man In The Middle Attack
(MITM) in a variety of ways including :

 IP spoofing
 DNS spoofing
 HTTP spoofing
 URL spoofing
SPOOFING
• A spoofing network attack is a type of cyberattack in
which an attacker disguises themselves as a trusted
entity to deceive or gain unauthorized access to a
computer system, network, or service. The goal of
spoofing attacks is to trick the target into believing that
the attacker is a legitimate entity, thereby gaining access
or manipulating data for malicious purposes.
• Spoofing can take many forms, such as spoofed emails,
IP spoofing, DNS Spoofing, website spoofing, spoofed
calls, URL spoofing etc.
PHISHING • Phishing attacks are fraudulent
emails, text messages, phone calls
or web sites designed to trick users
into downloading malware, sharing
sensitive information or personal
data (e.g., Social Security and credit
card numbers, bank account
numbers, login credentials).
• They appear to come from a
trusted source with the goal of
stealing sensitive information,
or even infecting your
computer with malware.
TYPES OF PHISHING ATTACK
• Spear Phishing: is a more targeted attempt to steal sensitive
information and typically focuses on a specific individual or
organization. These types of attacks use personal information
that is specific to the individual in order to appear legitimate.
• Whaling: is a category of phishing which focuses on a high-level
choice of target and is often targeted towards the senior
management of businesses.
• Smishing: is a type of phishing which uses SMS messages,
rather than email to target individuals. This method involves
sending an SMS to an individual’s phone number and usually
includes a call to action that requires an immediate response.
TYPES OF PHISHING ATTACK
• Link manipulation: messages contain a link to a malicious site that
looks like the official business but takes recipients to an attacker-
controlled server where they are persuaded to authenticate into a spoofed
login page that sends credentials to an attacker.
• Vishing: this type of scams take place over the phone or voice
messages.
 common vishing attack includes a call from someone claiming to be a representative from
Microsoft.

• Angler phishing: using social media, attackers reply to posts pretending


to be an official organization and trick users into divulging account
credentials and personal information.
DDoS (Distributed Denial of Service)
• A distributed denial-of-service (DDoS)
attack is a malicious attempt to disrupt
the normal traffic of a targeted server,
service or network by overwhelming the
target or its surrounding infrastructure
with a flood of Internet traffic.
• These networks consist of computers and
other devices which have been infected
with malware, allowing them to be
controlled remotely by an attacker. These
individual devices are referred to
as bots (or zombies), and a group of bots
is called a botnet.
Insider Threats
• An insider threat is a security risk that originates from within the
targeted organization. It typically involves a current or former
employee or business associate who has access to sensitive
information or privileged accounts within the network of an
organization, and who misuses this access.
• Insider threats can come from anywhere, including current
or former employees, vendors, contractors, partners, and
so forth. Any “insider” with access to the organization’s
computer systems and data increases the risk of a
network attack.
Types of insider threats include:
• Malicious insider: also known as a Turncloak, someone who
maliciously and intentionally abuses legitimate credentials,
typically to steal information for financial or personal incentives.
• Careless insider: an innocent pawn who unknowingly exposes
the system to outside threats. This is the most common type of
insider threat, resulting from mistakes, such as leaving a device
exposed or falling victim to a scam.
• A mole: an imposter who is technically an outsider but has
managed to gain insider access to a privileged network. This is
someone from outside the organization who poses as an
employee or partner.
References :
 www.cynet.com  https://youtu.be/JzoJeJBdhuI?
si=jkwfKy3fqQkFLVCF
 www.baeldung.com
 https://youtu.be/83LOa-dYi_A?si=5
 www.techtarget.com llg3cD3XrCzZq2t
 www.kapersky.com  https://youtu.be/ilhGh9CEIwM?si=
 www.cloudfare.com 7ekXrMrYHX9Nyhq7

 www.imperva.com
 Blog.frontiersin.org

You might also like