0% found this document useful (0 votes)
3 views

Assignment 223

Asd

Uploaded by

narrycjga
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Assignment 223

Asd

Uploaded by

narrycjga
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

School of Infomatics

Department of Computer Science


Computer Security Course
Assignment -2 (Individual Assignment)

Name : Yishak Madalcho

ID : cs/we/185/12

Section : 2

 Network security basics


Network security basics involve implementing measures
to protect the confidentiality, integrity, and availability of
1
network resources. This includes securing network
devices, such as routers and switches, and ensuring
secure communication between devices.

 Threats on a network
Threats on a network can come in various forms,
including malware, phishing attacks, denial-of-service
attacks, and unauthorized access. These threats can
compromise the network's security and lead to data
breaches or service disruptions.

 Trust, weaknesses, risks, and


vulnerabilities
Trust, weaknesses, risks, and vulnerabilities are
important concepts in network security. Trust refers to
the assurance that a system or entity can be relied upon.
Weaknesses are flaws or vulnerabilities in a system that
can be exploited by attackers. Risks are the potential
negative consequences of these weaknesses being
exploited, while vulnerabilities are the weaknesses
themselves.

 TCP/IP suit weaknesses buffer


and overflows
The TCP/IP suite, which is the foundation of the internet,
has its weaknesses. One common weakness is buffer

2
overflow, where an attacker sends more data than a
program can handle, leading to a crash or allowing the
execution of malicious code.

 Network security protocols


Network security protocols are used to secure different
layers of the network stack. At the application layer,
protocols like HTTPS and SSL/TLS provide web security
and secure email communication.
 Application layer security
At the application layer, security protocols focus on securing specific
applications or services. For example, web security protocols
aim to protect web applications and websites from various threats,
such as cross-site scripting (XSS) attacks, SQL injections, and session
hijacking. These protocols include HTTPS (HTTP Secure), SSL
(Secure Sockets Layer), and TLS (Transport Layer Security).

Similarly, email security protocols aim to secure email


communications, preventing unauthorized access and protecting
against spam, phishing, and malware. Protocols like
Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty
Good Privacy (PGP) are commonly used for email encryption and
digital signatures.

At the transport layer, security protocols ensure secure


communication between network devices. The most widely used

3
protocol in this layer is Transport Layer Security (TLS), which
provides encryption and authentication for data transmitted over
the network. TLS is commonly used to secure web browsing, email
communication, and other applications that require secure data
transfer.

Network layer security protocols protect the network infrastructure


itself. IPsec (Internet Protocol Security) is a commonly used
protocol suite that provides authentication, integrity, and
confidentiality for IP packets. It is often used in virtual private
networks (VPNs) to secure data transmission between networks.

Finally, link layer security protocols focus on securing


communication between adjacent network devices, such as routers
or switches. These protocols include protocols like Ethernet, which
provide basic security features like MAC address filtering and link
encryption.

Overall, network security protocols play a crucial role in protecting


data and ensuring secure communication at various layers of the
network infrastructure.

 Transport layer security


Transport Layer Security (TLS) is a protocol that provides
secure communication between network devices at the
transport layer. It ensures the confidentiality, integrity,
4
and authenticity of data transmitted over a network. TLS
is commonly used to secure web browsing, email
communication, and other applications that require
secure data transfer.

 Network layer security


Network layer security protocols, such as VPNs, protect
data in transit.
Network layer security focuses on securing the network
infrastructure itself. One commonly used protocol suite for network
layer security is IPsec (Internet Protocol Security). IPsec provides
authentication, integrity, and confidentiality for IP packets, ensuring
secure communication between networks. IPsec is often used in
virtual private networks (VPNs) to secure data transmission.

 Link layer security protocols,


Link layer security protocols aim to secure
communication between adjacent network devices, such
as routers or switches. These protocols provide basic
security features like MAC address filtering and link
encryption. One example of a link layer security protocol
is Ethernet, which is widely used in wired networks to
ensure secure communication between devices.

 Physical security
Physical security refers to the measures taken to protect
the physical components of a network, such as servers,
routers, switches, and cables. It includes securing access
to network equipment, implementing surveillance
5
systems, and protecting against physical threats like
theft, vandalism, or natural disasters. Physical security
measures are crucial for preventing unauthorized access
to network devices and ensuring the availability and
integrity of the network infrastructure.

 Firewalls

Firewalls are devices that monitor and control incoming


and outgoing network traffic based on predefined security
rules. Proxy servers act as intermediaries between clients
and servers, enhancing security and privacy. IDS/IPS
(Intrusion Detection System/Intrusion Prevention System)
are tools that detect and prevent unauthorized access or
malicious activities. Virtual Private Networks (VPNs)
create secure connections over public networks, allowing
remote users to access private networks securely.

 proxy server
A proxy server acts as an intermediary between clients
and servers. It receives requests from clients and
forwards them to the appropriate server, then relays the
server's response back to the client. Proxy servers can
enhance security by providing an additional layer of
protection between clients and servers. They can also
improve performance by caching frequently accessed
content and reducing network traffic.

 IDS/IPS

6
IDS (Intrusion Detection System) and IPS (Intrusion
Prevention System) are security tools used to detect and
prevent unauthorized access or malicious activities on a
network. IDS monitors network traffic and analyzes it for
suspicious patterns or known attack signatures. When an
intrusion is detected, it generates alerts for further
investigation. IPS, on the other hand, not only detects
intrusions but also takes active measures to prevent
them. It can block or mitigate attacks in real-time by
modifying network traffic or reconfiguring firewall rules.

 Virtual Private Network (VPN)


A Virtual Private Network (VPN) creates secure
connections over public networks, such as the internet. It
allows remote users to securely access private networks
as if they were directly connected to them. VPNs use
encryption and tunneling protocols to ensure the
confidentiality and integrity of data transmitted over the
network. They are commonly used by organizations to
provide secure remote access for employees or to
connect geographically dispersed networks together.
VPNs can also be used by individuals to protect their
privacy and secure their internet connections, especially
when using public Wi-Fi networks.

You might also like