Faculty of Inforamation Technology and Communication Studies. Department of Information Technology Studies LEVEL 200
Faculty of Inforamation Technology and Communication Studies. Department of Information Technology Studies LEVEL 200
Faculty of Inforamation Technology and Communication Studies. Department of Information Technology Studies LEVEL 200
• Active Attack – In an active attack, a miscreant tries to attack data while it is being
sent to some other location. He can make changes to it or can hack confidential
information while data is being transferred. The prevention of these attacks is quite
difficult because of a broad range of potential physical, network and software
vulnerabilities. Instead of prevention, it emphasizes on the detection of the attack
and recovery from any disruption or delay caused by it.
• Passive Attack – In a passive attack, the hacker constantly monitors the system
to gain valuable information through open ports. The attacker does not
attempt to make changes to data. Unlike active attack, the passive attack is
hard to detect because it doesn’t involve any alteration in the data or system
resources. Thus, the attacked entity doesn’t get any clue about the attack.
Although, it can be prevented using encryption methods in which the data is
firstly encoded in the unintelligible language at the sender’s end and then at
the receivers end it is again converted into human understandable language.
Key Differences Between Active and Passive Attacks
• The active attack includes modification of the message. On the other hand, in
passive attacks, the attacker doesn’t commit any changes to the intercepted
information.
• The active attack causes a huge amount of harm to the system while the
passive attack doesn’t cause any harm to the system resources.
• A passive attack is considered as a threat to data confidentiality. In contrast, an
active attack is a threat to the integrity and availability of the data.
• The attacked entity is aware of the attack in case of active attack. As against,
the victim is unaware of the attack in the passive attack.
• The active attack is accomplished by gaining the physical control over the
communication link to capture and insert transmission. On the contrary, in a
passive attack, the attacker just needs to observe the transmission.
WIRELESS SECURITY
• Wireless security is the prevention of unauthorized access or damage to
computers or data using wireless networks, which include Wi-Fi networks.The
most common type is Wi-Fi security, which includes Wired Equivalent Privacy
(WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard
from 1997.
THERE ARE FOUR MAJOR TYPES OF WIRELESS SECURITY
• REMOTE CHECK-IN
• SMARTPHONE NOTIFICATION
DISADVANTAGE
• Modern live video surveillance systems offer many of the same advantages—
without the large retainer or paycheck. ...
• In the network security, honeypot controlled and safe environment for showing how
attackers work and examining different types of threats. With a honeypot security,
staff won’t be distracted by real traffic using the network they’ll be able to focus
100% on threat. Honeypot can also catch internet threats.
• It can be used to detect attacks or deflect them from a legitimate target. It can also
be used to gain information about how cyber criminals operate.
Effectiveness of honeypot.
• Honeypots are only effective if they can deceive attackers into thinking in the
computer systems. Most attackers do not want their methods known because they
know that it will lead to quick development of defensive methods against their
method.
These honeypots imitate real world systems and applications with actual services, function and
operating systems involving high levels of interactivity ( though less than pure honeypot) . it gives
extensive details about how an attacker progresses and how payloads execute in a network .
It falls between high and low interaction honeypots they come with extended capabilities
compared to low interaction honeypots but reduced implementation complexities than high
interaction honeypots. It imitate the application layer but don’t have their own operating system.
• Low interaction honeypots.
It allow partial interaction with systems since they run limited emulated services with
restricted functionality as would be typically expected from a server. Though these are
the easiest to set up and maintain, the run the risk of coming across as in authentic
targets to potential attackers.
• viruses
• worms
• Trojan horses
• spyware.
• The aim of malware detection is to find and remove any type of malware code
from the network.
• The strategies applied revolves around the CIA objectives which is expanded
as confidentiality, integrity, and availability. These objectives ensure that only
authorized users can access the information.
Access Management:
• It is a method of securing the network by granting access to authorized users
the right to access the network. This will prevent any unauthorized attack on
the network thereby securing the network.
• This process makes use of certain policies which are defined under Information
Security Management. This process was added to secure the confidential
information that is transferred through the network.
• It provide administrators with the tools and technologies to change a user’s
role, track user activities, create reports on those activities, and enforce
policies on an ongoing basis. These systems are designed to provide a means of
administering user access across an entire enterprise and to ensure
compliance with corporate policies and government regulations.
Benefits of Network Security
• Network Security is vital in;
• A well-designed network security system reduces operating costs and protects businesses from
severe losses caused by data breaches or other security incidents. Having valid access to systems,
apps, and data allows businesses to run smoothly and provide services and goods to consumers.