Assignment 223
Assignment 223
ID : cs/we/185/12
Section : 2
Threats on a network
Threats on a network can come in various forms,
including malware, phishing attacks, denial-of-service
attacks, and unauthorized access. These threats can
compromise the network's security and lead to data
breaches or service disruptions.
2
overflow, where an attacker sends more data than a
program can handle, leading to a crash or allowing the
execution of malicious code.
3
protocol in this layer is Transport Layer Security (TLS), which
provides encryption and authentication for data transmitted over
the network. TLS is commonly used to secure web browsing, email
communication, and other applications that require secure data
transfer.
Physical security
Physical security refers to the measures taken to protect
the physical components of a network, such as servers,
routers, switches, and cables. It includes securing access
to network equipment, implementing surveillance
5
systems, and protecting against physical threats like
theft, vandalism, or natural disasters. Physical security
measures are crucial for preventing unauthorized access
to network devices and ensuring the availability and
integrity of the network infrastructure.
Firewalls
proxy server
A proxy server acts as an intermediary between clients
and servers. It receives requests from clients and
forwards them to the appropriate server, then relays the
server's response back to the client. Proxy servers can
enhance security by providing an additional layer of
protection between clients and servers. They can also
improve performance by caching frequently accessed
content and reducing network traffic.
IDS/IPS
6
IDS (Intrusion Detection System) and IPS (Intrusion
Prevention System) are security tools used to detect and
prevent unauthorized access or malicious activities on a
network. IDS monitors network traffic and analyzes it for
suspicious patterns or known attack signatures. When an
intrusion is detected, it generates alerts for further
investigation. IPS, on the other hand, not only detects
intrusions but also takes active measures to prevent
them. It can block or mitigate attacks in real-time by
modifying network traffic or reconfiguring firewall rules.