Network Security
Network Security
REPORTERS :
ROMELYN LINGO
CRIS IVAN C. ALINTOSON
ATRIO ALAMEDA
WHAT IS NETWORK SECURITY
•Firewalls
•Access control
•Virtual private networks (VPNs)
•Intrusion prevention systems
•Wireless security
•Application security
•Behavioral analytics
Network architecture and topologies
•Network Architecture:
Network architecture refers to the design and layout of a network,
including its components and how they are interconnected. Several
common network architectures are used in modern networks:
INTERNET AND INTRANET
Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of
the two devices on a link can transmit; the other can only receive. For example, Keyboards.
Half-Duplex
With half-duplex, communications happen in both directions, but in only one direction at
a time. When two computers communicate using half-duplex, one computer sends a signal
and the other receives; then, at some point, they switch sending and receiving roles. For
example, push-to-talk technology (walkie-talkie).
Full-duplex
Full-duplex allows communication in both directions simultaneously. Both stations can send
and receive signals at the same time. Full-duplex communications are similar to a telephone
call, in which both people can talk simultaneously.
DATA FLOW (Cont)
Server, Workstation, and Client role in networking
Server
A core component of the network, It provides resources to the clients on the
network (―serves‖ them, in other words). Servers are typically powerful
computers that run the software that controls and maintains the network. This
software is known as the network operating system.
Client
A client is any network entity that can request resources from the network.
Client computers also depends primarily on the central server for processing
activities.
Server, Workstation, and Client role in networking
• Workstation
Normally refers to
any computer that is
connected to the
network and used by
an individual to do
work
1. Client-Server Architecture: In this architecture, devices on the network are divided into
clients (end-user devices) and servers (centralized systems that provide services or resources).
Clients request services or data from servers, and servers respond to these requests. This
architecture is commonly used in business environments and the internet.
Advantages of a client-server Network
• Provides of better security.
• Easier to administer when the network is large because administration is
centralized.
• All date can be backed up on one central location.
• Each segment is provided with dedicated point-to-point wiring to the central hub.
• As more and more nodes and segments are added, the maintenance becomes difficult.
IP spoofing
DNS spoofing
HTTP spoofing
URL spoofing
SPOOFING
• A spoofing network attack is a type of cyberattack in
which an attacker disguises themselves as a trusted
entity to deceive or gain unauthorized access to a
computer system, network, or service. The goal of
spoofing attacks is to trick the target into believing that
the attacker is a legitimate entity, thereby gaining access
or manipulating data for malicious purposes.
• Spoofing can take many forms, such as spoofed emails,
IP spoofing, DNS Spoofing, website spoofing, spoofed
calls, URL spoofing etc.
PHISHING • Phishing attacks are fraudulent
emails, text messages, phone calls
or web sites designed to trick users
into downloading malware, sharing
sensitive information or personal
data (e.g., Social Security and credit
card numbers, bank account
numbers, login credentials).
• They appear to come from a
trusted source with the goal of
stealing sensitive information,
or even infecting your
computer with malware.
TYPES OF PHISHING ATTACK
• Spear Phishing: is a more targeted attempt to steal sensitive
information and typically focuses on a specific individual or
organization. These types of attacks use personal information
that is specific to the individual in order to appear legitimate.
• Whaling: is a category of phishing which focuses on a high-level
choice of target and is often targeted towards the senior
management of businesses.
• Smishing: is a type of phishing which uses SMS messages,
rather than email to target individuals. This method involves
sending an SMS to an individual’s phone number and usually
includes a call to action that requires an immediate response.
TYPES OF PHISHING ATTACK
• Link manipulation: messages contain a link to a malicious site that
looks like the official business but takes recipients to an attacker-
controlled server where they are persuaded to authenticate into a spoofed
login page that sends credentials to an attacker.
• Vishing: this type of scams take place over the phone or voice
messages.
common vishing attack includes a call from someone claiming to be a representative from
Microsoft.
www.imperva.com
Blog.frontiersin.org