Security Issues
Security Issues
ABSTRACT
John, sitting desperately in and losing his lifetime savings. In the present day
front of his system tries to hack his friend William’s scenario, where the earth is shrinking rapidly, such
bank account. But after a tiresome job, all he could that the entire world is now on your desktop,
succeed in getting was an encrypted code, which security is gaining much significance consequently.
did not make any sense to him and would take a Cryptography, authentication and access control
lifetime to decode making use of the concept of mechanisms play a very important role in secured
probability. Thanks! to the advanced techniques of communication as they form the major disciplines
security which saved William from getting bankrupt of network security.
• Worms
VIRUSES FIREWALLS
A computer virus is a set of instructions that, A firewall is a network access control device
when executed, inserts copies of itself into other that is designed to deny all traffic except that is
programs. Some viruses are malicious and explicitly allowed. Firewalls can be configured
delete files or cause systems to become to allow traffic based on the service, the IP
unusable. Other viruses do not perform any address of the source or destination, or the ID of
malicious act except to spread to other systems. the user requesting service. Firewalls are
virus) and Melissa (a macro virus). firewalls and packet filtering firewalls.
Just as the Greeks used a gift to hide evidence of packages that sit on top of the general –purpose
their attack, so too does a Trojan horse program operating systems or on firewall appliances. If a
hide its malicious nature behind the façade of rule does not specifically allow the traffic to
something useful or interesting. Example is the flow, the firewall will deny or drop the packets.
email with a visual basic program, which caused connections terminate on the firewall. If the
the e-mail services to stop completely. policy rules allow the traffic, the firewall
A worm, as the name implies is a program that interface to the server system.
crawls from system to system without any Packet filtering firewalls is similar to the
assistance from its victims. The program application layer firewalls in matters related to
replicates itself by installing copies of itself on policy rules. Policy rules are enforced through
other machines across the network. The most the use of packet inspection filters. With a
famous recent worm is called the CodeRed. packet filtering firewall, connections do not
terminate on the firewall, but instead travel applications that touch everyday life; the
directly to the destination. As the packets arrive security of ATM cards, computer passwords,
at the firewall, the firewall will determine if the and electronic commerce all depend on
packets and the connection state are allowed by cryptography.Until modern times, cryptography
the policy rules. If so, the packet is sent on its referred almost exclusively to encryption, the
way. If not, the packet is denied or dropped. process of converting ordinary information
Drawbacks with firewalls-Firewalls assume (plaintext) into an unreadable ciphertext.
that all the unauthorized members are on the Decryption is the reverse process.
outside and everyone inside can be completely
trusted. This is an unwarranted assumption. A
Firewalls can be defeated by somehow injecting cipher
malicious code into the corporate network. (or
Firewalls, when not configured properly refuse cypher)
to recognize legitimate users and make their job is a
difficult. pair of
effective, but is time consuming destructive code can be written to foil the
log examination would be to create does not guarantee the safety of any
through computer logs looking for Physical security must not be neglected at any
Examining the threats and managing them safety and we cannot disregard the revolution
appropriately is very important for the smooth brought about by techniques like cryptography
running of any organisation. Although the and authentication in the field of network
security