Network Security: Attacks and Defence. A B S T R A C T Network Security has become very important in today’s world, as a result of which various methods are adopted to bypass it. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the user’s data. This paper outlines the various attack methods which are used, as well as various defence mechanism against them. Index Terms: DOS attacks, Firewalls, Encryption, Port Scanning, SSL, SHTTP, VPN I. INTRODUCTION System security alludes to shielding the sites areas or servers from different types of assault. System security is critical in every field of today 's reality, for example, military, government and …show more content…
Email is a generally utilized administration today and it is likewise contain numerous genuine imperfections, there is no arrangement of verifying the delicate and also the beneficiary, it is put away in different spots amid transmission and can be effortlessly caught and changed. SPAM are not kidding security danger they just require less labor however influence millions to billions of Email clients around the globe, they can pernicious connection or even false commercials. A system contains numerous vulnerabilities however a large portion of them can settled by taking after extremely basic techniques, for example, overhauling programming and effectively designing system and firewall guidelines, utilizing a decent hostile to infection programming etc.In this report a large portion of the fundamental data with respect to network security will be plot, for example, discovering and shutting vulnerabilities and forestalling system assaults furthermore efforts to establish safety as of now being utilized. II. DIFFERENT TYPES OF SECURITY ATTACKS A. Passive Attacks This type of attacks includes attempts to break the system using observed data. One of its example is plain text
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
These attacks can be extremely damaging to one’s intellectual properties (information, money, etc) as well as a concern for personal safety. The key to stopping or minimizing these attacks is to learn what these attacks are and how they are executed to really create an effective plan to stop unnecessary losses.
Goleniewski, L. (2007). Telecommunications Essentials: The Complete Global Source (2nd ed.). Upper Saddle River, NJ: Pearson Education, Inc.
The use of email adds another layer of complexity for organization. Email has become a de facto medium to spread malware, propagate scams, and attack a system. The stories of people being scammed via emails are no longer urban legends. Businesses must do everything they can to minimize their exposure to threats.
Today, security devices such as Firewall, IDS are used on the many organization's networks for preventing security attacks. But, these devices can only diagnose illegitimate traffic and prevent it. They cannot prevent attacks which are as a result of the network devices vulnerabilities in the switches, routers, and etc. A malicious user who is within the network can implement many attacks by using these vulnerabilities. This paper explains the kind of existing vulnerabilities in Cisco switches and methods of preventing these attacks from
In the budget preparation phase during the planning process, neutralizing attacks enables the organization to reduce cost by minimizing the number of cyber-attacks, developing preventing mechanisms for known threat for instance creating a signature to detect an intrusion and blocking the attacks from holding a network for example at the firewall. Also, the quality of the software and hardware devices is vital in the prevention of cyber-attacks. Accordingly it also helps in reducing the vulnerabilities the devices are exposed to in the course of all their operations.
From research on our network the external threats come from the internet majorly. Internet is a universal network that enables sharing of resources internationally. However, resource sharing can be greatly prone to attacks because the internet encompasses a lot of users with different motives. In addition, such attacks come from eavesdropping during transit but WebTechMsn has been able to address this issues by using fiber optic cables which are resistant to tapping of information a long communication channel.
The definition of a security system is just that a method of securing something using a system of interworking devices. Security systems work on the principle of entry point like doors and window as well as interior spaces. Security systems create a string deterrent for criminals who will see your home as a harder target go invade. With the number of home invasions that take place on a daily basis, homeowners are becoming more aware of the importance of securing their homes, if not for the securing of all that is valuable then for securing the lives of people within.
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
The critical factor of network development is security planning. Without doing a full hazard appraisal, it is unrealistic to get ready for security. This security arranging includes creating security policies and executing controls to keep PC dangers from getting to be reality.
After the violation of several layers of protection, it has been observed that the attacker or hacker may want to perform the below listed attacks.
As time goes by, network security has become substantially more important, whether it be for a business, the military, or even a private computer. With the introduction of the internet, security became a major concern and it’s only though a brief look recap on the history of security that we are allowed a better understanding of the emergence of the new technology that is released for the private and public sector. As mentioned earlier, the creation of the Internet allowed for a plethora of new threats. Despite the constant threats of malware and other annoyances, the architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats.
Every security professional knows that the network security measures depends upon the following three important factors [1]:
As the technology is growing the security threats are also increasing at higher rate. So, as to protect an organization from such network security threats severe actions and several steps have to be taken by network security administrators. In any large organization that is having large number of big servers, firewalls and interconnected network of hundreds of computers, security is one of the most important aspects so as to secure its network from intruders. Within the organization, all the computers and devices are interconnected in a LAN network or using a WLAN (Wireless Local Area Network). So, the most important task of network security administrator to secure its internal as well as external network from intruders because there are several ways intruders can sniff the network and resulting in heavy loss of data. There are several threats that can affect network security of an organization such as: Wireless Sniffing, DoS (Denial of Service), sniffing of VoIP network, trojans and unauthorized access to FTP server.
Next is to research the current logical and physical network security technologies being used or those that are currently in development.The key vulnerabilities that are found within SME networks are going to be reviewed and possible mitigation techniques normally used to defend against these vulnerabilities will be discussed.