DCN 4 Unit
DCN 4 Unit
Network security is a process through which a network is protected from unauthorized access,
hacking, denial of service (DoS) attacks, viruses, worms, and other threats. Network security is not
implemented by everyone, as it requires expertise.
To enhance network security in a network, we need to perform monitoring of the network and use
software and hardware components.
These components include firewalls, antivirus software, intrusion detection systems (IDS), and more.
Network security is a critical aspect of ensuring the confidentiality, integrity, and availability of data
and resources within a network. It requires expertise and the use of various tools and techniques to
safeguard against potential threats and attacks.
• The need for network security varies in different ways, and it serves the following purposes:
• Securing Data and Information from Unauthorized Access, Loss, and Modification:
– To protect data and information from unauthorized access, loss, and unauthorized
changes.
Confidentiality:
• Confidentiality ensures that only the sender and receiver can access the message,
meaning unauthorized access is prohibited.
Authentication:
• Authentication means verifying the user's identity, ensuring that the sender is indeed
who they claim to be.
• Authentication ensures that the person sending a message is, in fact, the claimed
sender and not someone else.
Integrity:
• Non-repudiation prevents situations where a user denies sending a message after it has
been sent.
• Non-repudiation doesn't allow the sender to later deny having sent the message.
Access Control:
• Access control ensures that specific users can access certain resources, while others
cannot.
• Access control regulates who can access which resources, limiting access to
authorized users.
Availability:
• Availability ensures that resources are only available to authorized users and not to
others.
Network issue:-
worm
• A worm is a type of computer program or virus that can replicate itself and spread to
other computers without the need for human intervention.
• Worms are similar to viruses in that they can cause harm to computer systems, but
they are self-replicating and do not require a person to help them spread.
• DOS
A Denial of Service (DoS) attack is an attack in which a hacker renders a network or
machine inaccessible to legitimate users. The primary goal of this attack is to prevent
users from accessing a particular service, such as the internet.
• Phishing
Malware
Malware, short for "malicious software" or "malicious program," is a highly harmful
type of software used by hackers and cybercriminals to steal a person's critical
information. In other words, malware is a dangerous software or program that
infiltrates your computer without your knowledge and can steal or delete all the data
on your computer.
• virus
• Ransomware
Ransomware is a type of malware that steals a user's data and, after stealing it,
blackmails the user. It demands a ransom from the user in exchange for the stolen
data. If the victim doesn't pay the ransom, the attacker may refuse to return the data.
Even if the victim does pay the ransom, there is no guarantee that the attacker will
actually return the data.
Threat
• A computer threat is a potential danger that can exploit vulnerabilities to compromise
security and cause significant damage. This can result in data loss or even physical
damage to hardware.
• The first step in protecting a computer system from security threats is to identify these
threats.
• A security threat is a type of risk that can potentially harm a computer system or an
organization. It might lead to data theft or cause damage by launching a virus attack
on the computer system
• Physical Threats: Physical threats can be further classified into three types:
• Internal: This includes incidents like fire outbreaks, unstable power supply, room
humidity, etc.
• External: This encompasses events like power outages, floods, earthquakes, etc.
• Human: This involves theft by an individual, causing damage to hardware, accidental
system damage, etc.
Cryptography
• The meaning of "Cryptography" is indeed "the art of protecting data"
• This algorithm is used for digital signatures, protecting data, securing debit and credit
card transactions, and browsing the internet.
Encryption:-
• Encryption is a process in cryptography where data or information is converted into
secret codes known as cipher text. The cipher text is not easily understandable and
can only be comprehended by experts. The original data or information is referred to
as plain text, and it is encrypted into cipher text.
• To read encrypted data, you need a key that allows you to decrypt it.
Decryption:-
• Decryption is a process where encrypted data is converted back into the original data.
• The encrypted data is referred to as cipher text, while the original data is known as
plain text. Changing cipher text to plain text is termed as Decryption. This process
also requires a key to decrypt the data.
Features of Cryptography:
1- In cryptography, information can only be read by the user who has access to it.
2- Once a message is sent from the sender to the receiver using this technique, the
message cannot be modified or edited.
3- In this technique, the data sent by the sender to the receiver gets stored.
4- In cryptography, after sending the message, the sender cannot deny having sent it
to the receiver, which is also known as the status of non-repudiation.
• In this type of cryptography, the sender and receiver share the same key. Symmetric
key cryptography is also referred to as private key cryptography.
1. DES:-
• The full name of DES is Data Encryption Standard. It is a type of encryption
technique used to encrypt data.
• DES is a symmetric-key encryption technique in which the same key is used for both
encrypting and decrypting the data. This means both the sender and receiver possess
the same private key.
• DES is a method used by government agencies in the past to secure sensitive data.
2. Triple DES
• Triple DES is more secure compared to DES and is relatively easy to implement. The
key size can be increased to provide enhanced data security.
3. AES
• AES is a symmetric block cipher technique used in place of DES and 3DES because it
provides greater security compared to DES and 3DES.
• AES is a type of algorithm known as the Rijndael algorithm, which converts plain text
into cipher text.