0% found this document useful (0 votes)
21 views

Network Security

The document discusses different methods of network security authentication including passwords, zero login, magnetic stripe cards, smart cards, tokens, and anti-malware software. It provides details on how each method works and their advantages and disadvantages.

Uploaded by

boggalive
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Network Security

The document discusses different methods of network security authentication including passwords, zero login, magnetic stripe cards, smart cards, tokens, and anti-malware software. It provides details on how each method works and their advantages and disadvantages.

Uploaded by

boggalive
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Network Security

Authentication:-
Is the verification that the data or information comes from
trusted zones.
Authentication and Security methods:-
1- Passwords.
2- Zero login.
3- Magnetic stripe Cards.
4- Smart Cards.
5- Tokens (Physical & Electronic).
6- Anti-malware software.

1- Passwords:-
Used for:-
• accessing the e-mail account.
• carry out online banking.
• access the social network sites.

How to keep your device well-protected:-

(a) Run anti-spyware software so the password not being relayed


back to whoever put spyware on your computer.
(b) Change password on regular basis
(c) Password shouldn’t be easy to crack:-
(I) Not has your name.
(II) Not has your birthday.
(III) Not has you pet’s name.
(VI) Not has your favourite colour.
Strong password must have:
(I) one capital letter at least.
(II) Space or any symbol of keyboard.
(III) One numeric value at least.

Examples of strong passwords:-


(a) A$$_m&C 9# .
(b) bYA%^3**.
(c) !FF@0j<7.

1
2- Zero login:-
It’s new standard of security of logging into computer system
without need to type in password.
It’s based on two factors:
(a) Biometrics:-
(I) Finger print.
(II) Touch ID
(III) Face ID.
(IV) Iris scans.
(V) Retina scans.

(b) Behavioral patterns:-


Is a way of recording the user’s usual habits like:-
(I) how he /she walks.
(II) The typing speed.
(III) The way how he/she swipes the touch screen.
(IV) His/her regular location.
Coupling the biometrics along with behavioral pattern, the
hacker or any intruder will be having difficulty to copy both
of them and it’s enhanced security that allows system to
uniquely and fairly identify the user without needing to
enter PIN or password.
3- Magnetic Stripe Cards:-
A card made of magnetic stripes (made of tiny iron particles which
acts as north pole and south pole to two binary values 0 and 1).
The magnetic stripe swiped in card reader and it contains: -
(a) ID number.
(b) Birth date.
(c) Gender (Male or Female).
Used in: -
(a) Door keys lock.
(b) Vending machines for buying food or drink.
(c) Network access cards.
Some ID card has holographic image (Hologram) to make
forgeryof card is more difficult.
Hologram changes the color or the appearance to have moving
object to be seen from different angles.
Some ID uses photographic image of the card user printed on the
card surface.
- Having hologram or photographic image will prevent copying
the stolen card and uses it illegally.

2
Photographic stripe card Holographic magnetic stripe card

Advantages of Magnetic stripe Cards:-

(a) It’s multi-used.


(b) Not expensive.
(c) Can be remotely deactivated (In case of lost or gets stolen).

Disadvantages of Magnetic Stripe Cards:-

(a) Less secure than the others security systems.


(b) Magnetic contents can be copied fairly easily.
(c) Cards wear out with lot of use.
(d) Magnetic readers failed to read the card on first attempt.

4- Smart Card:-

By using smart card through embedding RFID(Radio Frequency


IDentification) tag (Antenna and chip), it can act as smart contactless
card(can be read from distance no need to be swiped across the reader).

Chip on the smart card stores the following data:-

• Name.
• Gender.
• Security number.
• PIN(Personal Identification Number).
• Date of birth.

Card owner all he has to do is to scan the card close to RFID reader, then

asked to key in his/her PIN, if details match then the access will be
allowed.

3
5- Tokens:-

(I) Physical Token:-

Is an electronic device used to identify the owner by signing in (enter the


PIN code) and pressing on identify button, the token checks up the
entered data if it matches with what stored in it then it generates
OTP(One-Time Password).

Taking bank client as example to show in steps how the mechanism of


token:-

• A client has to insert his credit/debit card into the dedicated

slot.

• Token scans the data stored in the card to verify(first step

security).

• Token then asks client to enter his PIN(second step security)


• If the PIN and Card data match the ones in Token.
• Token generates OTP (One Time Password) which is 8-digit code

usually.

• The client takes the 8-digit code and enters it in the bank

account website then the access to his account is now allowed.

Physical Token has two types:-

(a) Disconnected Physical Token:-

This type of token uses keypad to enter the verifications.

(b) Connected Physical Token:-

This type transmits the OTP automatically to the computer via USB
port with no need to key in PIN code.

4
(II) Electronic token:-

Is a software installed on user’s laptop or smart phone, whenever


user wants to access to website or account the token software
generates OTP valid for less than minute, then when the user enters the
generated OTP the website or account check for matching to grant the
access.
6- Anti-malware Software:-
Is antivirus software which has to be installed in the computer in order
to check periodically for any possible threat or hack attack.
In steps how antivirus works:-
• Antivirus checks and scans the system thoroughly and compares
with it’s database of virus .
• Then it makes Heuristic Checking(The process of testing the
behaviour of the certain suspicious files if it act as virus ).
• Any infected file automatically put into quarantine which:-
❖ Allows virus to get deleted immediately.
❖ Or lets the user decides to delete or not(user may know
the quarantined file is not a virus).
False Positive: - The process done by antivirus of moving any file
or program behaves like a virus which is not into quarantine.
This false positive considers is major drawback of antivirus.
Antivirus must: -
• Be Kept up to date to update it’s database of virus regularly.
• Scan the full system of computer once a week specially if your
work bound it with internet because some viruses lie dormant
and may not picked up unless you scanned the system as whole.

You might also like