Computer Security (Chapter-4)
Computer Security (Chapter-4)
Network Security
Network security is an essential aspect of modern technology and communication systems. In this chapter,
we will explore the basics of network security, including the various threats that can compromise the
integrity and privacy of data. Additionally, we will delve into the concepts of trust, weaknesses, risks, and
vulnerabilities that should be considered when implementing network security measures.
by Gebremedhn Mehari
The Importance of Network Security
Network security plays a crucial role in safeguarding sensitive information from unauthorized access, modification, or
theft. By implementing robust security measures, organizations can protect their data, maintain customer trust, and
mitigate potential risks and vulnerabilities. It also helps in preventing breaches and cyber attacks that can lead to
financial loss and reputational damage.
Common Threats in Network Security
Unintentional mistakes by employees, such as weak passwords or falling for social engineering tactics,
can expose the network to risks.
Outdated Software
Failure to regularly update software and firmware leaves the network vulnerable to known security
vulnerabilities that have been patched in newer versions.
Insufficient Monitoring
Inadequate monitoring of network traffic and activity makes it difficult to detect and address security
incidents promptly.
Risks and Vulnerabilities
"The price of light is less than the cost of darkness." - Arthur C. Nielsen
Every network faces a multitude of risks and vulnerabilities that can lead to
significant consequences. Understanding these risks and vulnerabilities is
crucial for implementing effective security measures.
TCP/IP Suite Weaknesses and
Buffer Overflows
TCP/IP Suite Overview
Foundation of Two main protocols Layered architecture
modern networking TCP (Transmission Control The suite is organized into
Protocol) ensures reliable distinct layers, each responsible
The TCP/IP suite, developed in
connection and data delivery, for specific tasks such as data
the 1970s, is the fundamental
while IP (Internet Protocol) encapsulation, error checking,
protocol for communication on
handles addressing and routing. and routing.
the internet.
Weaknesses of TCP/IP Suite
Buffer overflows can result in data corruption, Attackers can exploit buffer overflows to inject and
leading to inaccurate information and potential execute malicious code remotely, taking control of
system failure. vulnerable systems.
Network Security Protocols
Application Layer Security
Application layer security protocols provide a robust defense against cyber threats at the highest layer of the
network stack. These protocols, such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS),
enable secure communication between applications, ensuring data integrity, confidentiality, and
authentication.
"The most effective email security protocols employ a combination of encryption, digital signatures, and
spam filtering to mitigate the risk of data breaches and phishing attacks." – John Doe, Email Security
Expert
SSL/TLS PGP
SSL/TLS encryption is used to secure the Pretty Good Privacy (PGP) is an encryption
transmission of emails between mail servers, method that enables users to digitally sign and
preventing interception and unauthorized encrypt email messages, ensuring message
access to email content. integrity and confidentiality.
SPF DMARC
Sender Policy Framework (SPF) is an email Domain-based Message Authentication,
validation system that verifies the authenticity Reporting, and Conformance (DMARC) is a
of the email sender's domain, reducing the risk protocol that adds an additional layer of email
of email spoofing and phishing. authentication by aligning SPF and DKIM
records. DomainKeys
Identified Mail
t
y
b
y
a
l
t
e
t Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between
h
e network applications. It is commonly used to protect sensitive information, such as usernames, passwords,
and credit card details, transmitted over the internet. TLS uses encryption algorithms to scramble the data,
s making it unreadable to anyone who intercepts it.
o
u
r
c
e
I
P
a
How Transport Layer Security works
Handshake Encryption Data Transmission
The TLS handshake is the During the TLS handshake, Once the secure connection is
initial process that establishes the client and the server established, data can be
a secure connection between negotiate an encryption transmitted between the client
the client and the server. It algorithm to encrypt the data and the server with the
involves the exchange of keys being transmitted. This assurance that it will remain
and authentication to ensure ensures that the information unharmed and confidential
the identity of both parties. remains confidential and throughout the
cannot be deciphered by communication.
unauthorized entities.
The Network Security Layer
The network layer is responsible for routing data packets across networks. It establishes communication paths and
manages the transmission of information between connected devices. By understanding the intricacies of the network
layer, we can better comprehend the importance of securing it.
Types of Network Layer Attacks
- Roger Grimes
Wi-Fi is a popular wireless networking technology that enables devices to communicate with each other.
Although convenient, Wi-Fi networks can be more vulnerable to security breaches. WPA, and WPA2 are
common protocols used to secure Wi-Fi networks.
Wi-Fi Protected
Acces
Link Layer Security:
Link layer security plays a key role in protecting data from cyber threats. By using the right combination of
protocols such as SSL/TLS, Ethernet, and Wi-Fi.
1 Protection 2 Vulnerabilities
Link layer security provides a critical layer Although relatively secure, Wi-Fi networks
of protection for data as it travels across can be more vulnerable to security
networks. breaches.
Ethernet vs Wi-Fi:
Speed Ethernet networks can be faster than Wi-Fi
networks for data communication.