Chapter 1 - Introduction To Network Security
Chapter 1 - Introduction To Network Security
INTRO
COMPUTER NETWORK SECURITY course is designed
to focus on the overall security processes based on security
policy emphasizing on hands-on skills in the areas of a
secure perimeter, secure connectivity, identity services and
intrusion detection. The knowledge delivered shall enable
students to identify some of the security approaches to
design a defensive strategy in a computer network
environment. Discussion on the security features of
Microsoft Windows Server and Open Source Software
network operating systems are also included.
SYNOPSIS
TOPIC
INTRODUCTION TO COMPUTER This topic introduces the importance
NETWORK SECURITY of network security.
Students are introduced to identifying
security models that
involves in computer network security.
VULNERABILITIES, THREATS This topic provides an overview of
AND ATTACKS essential network security
concepts, common vulnerabilities,
threats, attacks and
vulnerability analysis. This topic
introduces students on network
vulnerabilities assessment using
various of tools.
TOPIC
TOPIC
SECURITY DEVICES AND This topic covers perimeter security devices
TECHNOLOGIES such as packet
filters in firewalls, Intrusion Detection
System (IDS), Intrusion
Prevention System (IPS), proxy server and
bastion host. This
topic covers viruses, Trojan Horses, and
worms and explains
what they can do to the system. Different
methods of protection
are also covered in the topic. It also covers
VPN topics.
HARDENING OPERATING SYSTEMS This topic covers the following areas:
Microsoft Windows
security approaches and Linux security
approaches. This topic
also covers on Kerberos authentication and
domain security.
PHYSICAL SECURITY This topic deals with hardening
physical security. It also
discusses about hardening devices
such as modem, routers and
wireless network.
DFS 4133
Computer
Network Security
Chapter 1:
INTRODUCTION TO COMPUTER
NETWORK SECURITY
Understand the need for network security.
• Identify the important requirements of network security
• Describe the need for network security.
• Identify potential risks to network security.
• Describe the goals of Network Security.
• Explain Open Security Models.
• Explain Restrictive Security Models.
• Explain Closed Security Models.
• Identify Legal Issues and Privacy Concerns.
Learning Outcomes:
• Network security consists of the provisions and
policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and
network-accessible resources.
• Protection of network & their services
• Protects from: unauthorized modification,
destruction, disclosure
• Ensures the network performs it functions correctly
& no harmful side effect
Asset Identification
- Threat is a possible danger that might exploit a vulnerability to breach
security and cause possible harm.
- Involve listing all possible threat that can occur in an organization. Example
list of sources of threats could include:
• The ex-employee who desires revenge.
• The deliberate cyber-spy looking to accumulate competitive information
on your company that he can use to improve his own company’s
positioning.
• The employee who doesn’t know that email attachments ending in “.exe”
should not be opened without the system administrator’s permission.
• Unauthorized access to resources or information through the use of a
network
• Unauthorized manipulation and alteration of information on a network
• Denial of service
Threat Assessment
Types of Threats
Understanding where your risks exist, and the best
way to control them is critical to your business. It is a
good practice to make a yearly risk assessment.
Risk Assessment
A risk assessment can protect your business from:
Risk Assessment
• Is the easiest to implement
• Few security measures are implemented.
• Foundation: simple passwords and server security
• This model assumes that users are trusted,
protected assets are minimal and threats are also
minimal.
• Gives users free access to all areas and security
breaches are not likely to result in great damage and
loss.
• But this model also implement data backup system
in most cases.