0% found this document useful (0 votes)
34 views

Understanding and Applying Cryptography and Data Security

Uploaded by

soumyajitsroy005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Understanding and Applying Cryptography and Data Security

Uploaded by

soumyajitsroy005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Introduction to Network

Security Weaknesses
Security Weaknesses in Hubs

•Broadcast Nature: Hubs broadcast data to all connected devices,


increasing the risk of data interception.
•No Intelligence: Lack of processing intelligence to differentiate
data packets.
Mitigation:
•Use switches instead of hubs.
•Implement network segmentation.
Security Weaknesses in Switches

•MAC Flooding Attack: Overloads the switch's MAC table, causing it


to broadcast traffic on all ports.
•VLAN Hopping: Attacker gains access to traffic on different VLANs.
Mitigation:
•Use port security to limit the number of MAC addresses per port.
•Implement VLAN tagging and restrict VLAN access.
Security Weaknesses in Routers

•Default Credentials: Many routers come with default


credentials that are easily guessable.
•Routing Table Poisoning: Maliciously altering the routing tables.
•Mitigation:
•Change default credentials immediately.
•Use routing protocol authentication.
Security Weaknesses in WiFi

•Weak Encryption: Older protocols like WEP are easily breakable.


•Rogue Access Points: Unauthorized access points mimic legitimate ones.
•Mitigation:
•Use WPA3 encryption.
•Regularly scan for and disable rogue access points.
Security Solutions for Networking Protocols

•IPSec: Secures IP communications by authenticating and


encrypting each IP packet.
•HTTPS: Encrypts data between the web server and the client,
preventing eavesdropping.
•SSL/TLS: Provides a secure channel over an unsecured network.
IPSec

•Authentication Header (AH): Provides data integrity and origin


authentication.
•Encapsulating Security Payload (ESP): Provides confidentiality, along
with data integrity and origin authentication.
•Use Cases: Secure VPNs, secure remote access.
HTTPS
•SSL/TLS Protocol: Secures communications between web
browsers and servers.
•Public Key Infrastructure (PKI): Manages encryption keys
and digital certificates.
•Use Cases: Secure online transactions, protect sensitive
data.
Security Solutions for Networking Devices

•VLAN (Virtual Local Area Network): Segments network traffic to


isolate sensitive data.
•VPN (Virtual Private Network): Creates a secure tunnel over an
unsecured network.
•Ingress Filtering: Blocks incoming traffic from malicious sources.
VLAN
•Traffic Segmentation: Isolates network traffic to improve security.
•Access Control: Restricts access to sensitive resources based on VLAN.
•Best Practices: Implement VLAN tagging and restrict VLAN trunking.
VPN
•Encryption: Encrypts data transmitted over public networks.
•Authentication: Ensures that only authorized users can access
the VPN.
•Use Cases: Secure remote access, secure site-to-site
connections.
Ingress Filtering
•Traffic Filtering: Blocks malicious or suspicious incoming traffic.
•IP Spoofing Prevention: Ensures that incoming packets have a
legitimate source address.
•Best Practices: Configure router and firewall rules to enforce ingress
filtering.
Thank You

You might also like