TBC602 Network Security Notes
TBC602 Network Security Notes
Mechanisms
- Encryption, Digital Signatures, Firewalls.
- Intrusion detection and prevention systems (IDS/IPS).
- Security protocols like SSL/TLS.
SET Protocol
- Secure Electronic Transaction for online payments.
- Involves cardholder, merchant, and payment gateway.
- Uses encryption and digital certificates.
S/MIME
- Standard for public key encryption of emails.
- Provides message integrity and authentication.
- Built into many email applications.
SSL/TLS
- Secure protocols for web and email communications.
- Provide encryption and secure data transfer.
- TLS is the modern replacement for SSL.
Wireless Transport Layer Security
- TLS adapted for wireless communication.
- Used in mobile devices and wireless networks.
- Ensures secure data transmission over air.
IP Security (IPSec)
- Secures IP packets using encryption and authentication.
- Used in VPNs for secure remote access.
- Includes protocols like AH and ESP.
Intruders
- Unauthorized users trying to access systems.
- Can be internal or external attackers.
- Detected using IDS/IPS tools.
Viruses
- Malicious code that replicates and spreads.
- Can damage files, slow systems, or steal data.
- Requires antivirus tools to detect and remove.
OS Security
- Secures operating systems from threats.
- Includes updates, patches, and access controls.
- Disables unnecessary services and ports.
Program Security
- Developing software with security in mind.
- Avoids buffer overflows and code injection.
- Follows secure coding practices.
E-Governance
- Use of digital tools for public services.
- Improves transparency and efficiency.
- Backed by IT Act provisions.
Unit 5: Advanced Security Concepts
Scanning Techniques
- Ping sweep finds live hosts on network.
- Port scanning identifies open ports.
- Used in vulnerability assessment.
Fingerprinting
- Active: Direct queries to find system info.
- Passive: Observes traffic to detect systems.
- Helps in identifying OS and services.
Internal Attacks
- Caused by insiders with access.
- Examples: Email misuse, mobile data theft.
- Often harder to detect than external attacks.
DOS Attacks
- Denial of Service attacks overload systems.
- Examples: Ping of Death, Teardrop, SYN Flood.
- DDoS involves multiple attacking systems.